Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974506
Ksh. Nareshkumar Singh, H. Devi, K. Robindro, A. Mahanta
Advancement in digital technology has led to an increase in the text data exponentially. A field called ‘text mining’ turns the massive amount of text data into high quality or actionable knowledge so that it can help in making the optimal decision, reduces the time and human effort to analyze it. We can perform several tasks on text data including part of speech tagging, parsing text, extract the relevant information, classify the text data, clustering, etc. Text representation is a necessary step to do all these tasks and its effect, especially on the end results of text classification or clustering is highly considerable. The aim of this paper is to highlight the prerequisite procedures to represent text data, different text representation methods, the role of dimensionality reduction, different proximity measures and their evaluation methods to assess results of text clustering or classification.
{"title":"A Systematic Study on Textual Data Processing in Text Mining","authors":"Ksh. Nareshkumar Singh, H. Devi, K. Robindro, A. Mahanta","doi":"10.1109/ICCCIS48478.2019.8974506","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974506","url":null,"abstract":"Advancement in digital technology has led to an increase in the text data exponentially. A field called ‘text mining’ turns the massive amount of text data into high quality or actionable knowledge so that it can help in making the optimal decision, reduces the time and human effort to analyze it. We can perform several tasks on text data including part of speech tagging, parsing text, extract the relevant information, classify the text data, clustering, etc. Text representation is a necessary step to do all these tasks and its effect, especially on the end results of text classification or clustering is highly considerable. The aim of this paper is to highlight the prerequisite procedures to represent text data, different text representation methods, the role of dimensionality reduction, different proximity measures and their evaluation methods to assess results of text clustering or classification.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974531
Ierin Babu, R. V. S. Balan, Paul P. Mathai
Certain Colleges students’ performance will be improved during their studies can be planned is important fortelling the studies performance of students. Here using the performance evaluation is measured on the basis of higher secondary level and, analysis of Emotional Quotient and Intelligent Quotient. An evaluation is doing according to the evaluation that is received from the analysis based on th mentioned above. The emotional quotient and intelligent quotient is not always same, it be far different in various people being. But these two content will be helping in the development of their academic knowledge and life long learning. In this paper presenting the performance of students by their higher secondary value, IQ and EQ values. It is find out only through some novel algorithms. It is defined on the basis of training, learning, analysis and prediction stage.Firstly students or faculty have to enter their marks in the interface provided and students have to attend an intelleigent quotient and emotional quotient questions that is set with the instruction of some psychologist. In prediction stage will producewheather the students will pass or fail. The testing phase it helps to determine is our prediction is correct or not.
{"title":"Envisaging the Academic Performance of Students","authors":"Ierin Babu, R. V. S. Balan, Paul P. Mathai","doi":"10.1109/ICCCIS48478.2019.8974531","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974531","url":null,"abstract":"Certain Colleges students’ performance will be improved during their studies can be planned is important fortelling the studies performance of students. Here using the performance evaluation is measured on the basis of higher secondary level and, analysis of Emotional Quotient and Intelligent Quotient. An evaluation is doing according to the evaluation that is received from the analysis based on th mentioned above. The emotional quotient and intelligent quotient is not always same, it be far different in various people being. But these two content will be helping in the development of their academic knowledge and life long learning. In this paper presenting the performance of students by their higher secondary value, IQ and EQ values. It is find out only through some novel algorithms. It is defined on the basis of training, learning, analysis and prediction stage.Firstly students or faculty have to enter their marks in the interface provided and students have to attend an intelleigent quotient and emotional quotient questions that is set with the instruction of some psychologist. In prediction stage will producewheather the students will pass or fail. The testing phase it helps to determine is our prediction is correct or not.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127927715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974544
Tanishq Varshney, Nikhil Sharma, I. Kaushik, B. Bhushan
Internet of Things (IoT) depicts a future technology where devices establish a connection with internet for building the intelligent structural system and to implement self-configuration system IoT is an internetworking of devices which are physically present, function of that device is to sense the data In today’s scenario IoT involves with different technologies like blockchain, WSN and many more to give better results. Also, IoT has various implementations like in healthcare, wearables, farming etc. Main objective of IoT is to produce a helpful communication between any two heterogeneous devices, which are physically present at various locations with the help of technology of networking. Applications and implementations of IoT is increasing day-by-day, to secure and maintain Confidentiality, Integrity, Availability (CIA) and other parameters becomes very crucial. We have discussed the principles of IoT in this paper, then comparison between the IoT and Traditional IT services is being discussed. Appropriate techniques and mechanisms to build a secure framework for covering all the IoT layers is being shown in this paper. This paper also discusses about the privacy and security challenges faced during the designing of IoT network. Then the security measures proposed by various researchers is being highlighted in this paper, so as to make a reliable IoT network.
{"title":"Architectural Model of Security Threats & theirCountermeasures in IoT","authors":"Tanishq Varshney, Nikhil Sharma, I. Kaushik, B. Bhushan","doi":"10.1109/ICCCIS48478.2019.8974544","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974544","url":null,"abstract":"Internet of Things (IoT) depicts a future technology where devices establish a connection with internet for building the intelligent structural system and to implement self-configuration system IoT is an internetworking of devices which are physically present, function of that device is to sense the data In today’s scenario IoT involves with different technologies like blockchain, WSN and many more to give better results. Also, IoT has various implementations like in healthcare, wearables, farming etc. Main objective of IoT is to produce a helpful communication between any two heterogeneous devices, which are physically present at various locations with the help of technology of networking. Applications and implementations of IoT is increasing day-by-day, to secure and maintain Confidentiality, Integrity, Availability (CIA) and other parameters becomes very crucial. We have discussed the principles of IoT in this paper, then comparison between the IoT and Traditional IT services is being discussed. Appropriate techniques and mechanisms to build a secure framework for covering all the IoT layers is being shown in this paper. This paper also discusses about the privacy and security challenges faced during the designing of IoT network. Then the security measures proposed by various researchers is being highlighted in this paper, so as to make a reliable IoT network.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121758304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/icccis48478.2019.8974497
{"title":"[ICCCIS 2019 Blank Page]","authors":"","doi":"10.1109/icccis48478.2019.8974497","DOIUrl":"https://doi.org/10.1109/icccis48478.2019.8974497","url":null,"abstract":"","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134528472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974510
Vicky Vikrant, Hariom Tyagi
An internet is backbone of all kind of communication such as unicast, broadcast and multicast, as multicast communication is more efficient because it provide a better communication than unicast and broadcast in the context of bandwidth utilization. The multicast communication is popular in the area of audio-conferencing, video-conferencing and data distribution. There are several schemes such as hashing technique, tree based Hashing and Hash tree signing technique. These schemes have a lot of issues like communication cost, hash computation technique. Aim of this work is to compute the growth of proposed work and compare the performance with existing schemes. An adaptive technique has been proposed for source authentication in multicast system. The new technique is named elliptic curve cryptography source authentication (ECCSA). It has less communication cost as compared to SHS, EMSS, and HMSA.
{"title":"A Source Authentication Mechanism for Multicast Communication System Using Adaptive Hash Tree","authors":"Vicky Vikrant, Hariom Tyagi","doi":"10.1109/ICCCIS48478.2019.8974510","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974510","url":null,"abstract":"An internet is backbone of all kind of communication such as unicast, broadcast and multicast, as multicast communication is more efficient because it provide a better communication than unicast and broadcast in the context of bandwidth utilization. The multicast communication is popular in the area of audio-conferencing, video-conferencing and data distribution. There are several schemes such as hashing technique, tree based Hashing and Hash tree signing technique. These schemes have a lot of issues like communication cost, hash computation technique. Aim of this work is to compute the growth of proposed work and compare the performance with existing schemes. An adaptive technique has been proposed for source authentication in multicast system. The new technique is named elliptic curve cryptography source authentication (ECCSA). It has less communication cost as compared to SHS, EMSS, and HMSA.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129383761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974494
Sandeep Gulia, Anwar Ahmad
The Long Term Evolution (LTE) and LTE-Advanced are two most versatile mobile technologies in the cellular networks that have been deployed at a fast pace all over the world. Theses technologies have been aggressively deployed than any other cellular technology previously and their adoption rate by the cellular operators over the world has surpassed even Global System for Mobile (GSM) and the Universal Mobile Telecommunications System (UMTS) that were deployed in the 1990s & early 2000s respectively. In this paper, we investigate several key LTE physical layer parameters such as Bit Error Rate (BER), Block Error Rate (BLER), throughput, Cumulative Distribution Function (CDF), macroscopic path losses, Signal to Noise Ratio (SNR) etc. We comprehensively evaluate & analyze the performance of above mentioned parameters using various dependent parameters & provide the simulation results for each parameter considered. At the end we conclude & discuss the performance simulation results.
{"title":"Physical Layer Performance Analysis of LTE Networks for Downlink","authors":"Sandeep Gulia, Anwar Ahmad","doi":"10.1109/ICCCIS48478.2019.8974494","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974494","url":null,"abstract":"The Long Term Evolution (LTE) and LTE-Advanced are two most versatile mobile technologies in the cellular networks that have been deployed at a fast pace all over the world. Theses technologies have been aggressively deployed than any other cellular technology previously and their adoption rate by the cellular operators over the world has surpassed even Global System for Mobile (GSM) and the Universal Mobile Telecommunications System (UMTS) that were deployed in the 1990s & early 2000s respectively. In this paper, we investigate several key LTE physical layer parameters such as Bit Error Rate (BER), Block Error Rate (BLER), throughput, Cumulative Distribution Function (CDF), macroscopic path losses, Signal to Noise Ratio (SNR) etc. We comprehensively evaluate & analyze the performance of above mentioned parameters using various dependent parameters & provide the simulation results for each parameter considered. At the end we conclude & discuss the performance simulation results.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123174414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974536
Dushyant Singh Jasrotia, M. Nene
Study in paper accentuates the need of utilising Unmanned Aerial Vehicles(UAVs) in an Radio Frequency Identification (RFID) Sensor Network environment to develop mission critical applications. UAVs can act as a data logger and enable localisation in such an integrated environment, that can help us develop mission critical applications which can be deployed in harsh environments. The paper focuses on investigation and comparison of localisation techniques using UAVs in the given technology space. The need to establish localisation using UAVs, which demands rigorous mathematical models, approaches and experimental setups, is envisaged.
{"title":"Localisation using UAV in RFID and Sensor Network Environment:Needs and Challenges","authors":"Dushyant Singh Jasrotia, M. Nene","doi":"10.1109/ICCCIS48478.2019.8974536","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974536","url":null,"abstract":"Study in paper accentuates the need of utilising Unmanned Aerial Vehicles(UAVs) in an Radio Frequency Identification (RFID) Sensor Network environment to develop mission critical applications. UAVs can act as a data logger and enable localisation in such an integrated environment, that can help us develop mission critical applications which can be deployed in harsh environments. The paper focuses on investigation and comparison of localisation techniques using UAVs in the given technology space. The need to establish localisation using UAVs, which demands rigorous mathematical models, approaches and experimental setups, is envisaged.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127823525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974560
Prabhu Jyot Singh, Rohan G. de Silva
Unmanned Aerial Vehicles (UAVs) have become popular in commercial applications and the focus of interest has moved to UAV networks as well. A private UAV network or a Local Area Network of Drones (LoDs) is the best suitable UAV network for a small organization or an individual to perform specific tasks. The commercial UAVs which are available in the market has limited processing power and memory capacity. Although a UAV in a LoD can transfer the control and data signals to another UAV and finally, to the ground station, the performance of a LoD is limited by these constraints of the UAVs.In this paper, we propose a design of single control and feedback signal frame which uses a cross-layer approach. We compared the performance of this signaling mechanism with the existing signaling mechanism (a separate control and a feedback frame for each UAV) in LoD networks. We calculate the delay from the ground station to each UAV node for both signaling mechanisms and show that the new cross-layer single control and feedback frame signaling mechanism is better (less delay on the average) for signaling in a LoD network.
{"title":"Cross-Layer Design of Control and Feedback Signal Frames for LANs of Drones","authors":"Prabhu Jyot Singh, Rohan G. de Silva","doi":"10.1109/ICCCIS48478.2019.8974560","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974560","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) have become popular in commercial applications and the focus of interest has moved to UAV networks as well. A private UAV network or a Local Area Network of Drones (LoDs) is the best suitable UAV network for a small organization or an individual to perform specific tasks. The commercial UAVs which are available in the market has limited processing power and memory capacity. Although a UAV in a LoD can transfer the control and data signals to another UAV and finally, to the ground station, the performance of a LoD is limited by these constraints of the UAVs.In this paper, we propose a design of single control and feedback signal frame which uses a cross-layer approach. We compared the performance of this signaling mechanism with the existing signaling mechanism (a separate control and a feedback frame for each UAV) in LoD networks. We calculate the delay from the ground station to each UAV node for both signaling mechanisms and show that the new cross-layer single control and feedback frame signaling mechanism is better (less delay on the average) for signaling in a LoD network.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"63 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133774929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974549
Hardik Arora, A. Agrawal, Ankur Choudhary
Video Games are the most common and popular ways of entertainment mainly amongst the younger generation of world. Due to the advent of Virtual Reality (VR) and Brain Computer Interface (BCI), the gaming experience has increased exponentially amongst the users and the use of Artificial Intelligence (AI) in video games makes it less predictive and more tough and exciting to play. With Virtual Reality now looking distinctly normal, Brain Computer Interface is all set to become the futuristic technology in the gaming horizon. The researchers discover where the technology is at present and how it could transform the way users play in the future. Through this paper, we propose a method to make the video games more exciting and challenging for the users to experience ultimate gaming by combining the trending topics in the world of computer science i.e. BCI and AI.
{"title":"Conceptualizing BCI and AI in Video Games","authors":"Hardik Arora, A. Agrawal, Ankur Choudhary","doi":"10.1109/ICCCIS48478.2019.8974549","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974549","url":null,"abstract":"Video Games are the most common and popular ways of entertainment mainly amongst the younger generation of world. Due to the advent of Virtual Reality (VR) and Brain Computer Interface (BCI), the gaming experience has increased exponentially amongst the users and the use of Artificial Intelligence (AI) in video games makes it less predictive and more tough and exciting to play. With Virtual Reality now looking distinctly normal, Brain Computer Interface is all set to become the futuristic technology in the gaming horizon. The researchers discover where the technology is at present and how it could transform the way users play in the future. Through this paper, we propose a method to make the video games more exciting and challenging for the users to experience ultimate gaming by combining the trending topics in the world of computer science i.e. BCI and AI.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"391 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115203334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974492
Misgina Tsighe Hagos, Shri Kant, Surayya Ado Bala
Early diagnosis of diabetic retinopathy for the treatment of the disease has been failing to reach diabetic people living in rural areas. The shortage of trained ophthalmologists, limited availability of healthcare centers, and expensiveness of diagnostic equipment are among the reasons. Although many deep learning-based automatic diagnosis of diabetic retinopathy techniques have been implemented in the literature, these methods still fail to provide a point-of-care diagnosis, and this raises the need for an independent diagnostic of diabetic retinopathy that can be used by a non-expert. Recently the usage of smartphones has been increasing across the world; automated diagnoses of diabetic retinopathy can be deployed on smartphones in order to provide an instant diagnosis to diabetic people residing in remote areas. In this paper, inception based convolutional neural network and binary decision tree-based ensemble of classifiers have been proposed and implemented to detect and classify diabetic retinopathy. The proposed method was imported to a smartphone application for further classification, which provides an easy and automatic system for diagnosis of diabetic retinopathy.
{"title":"Automated Smartphone Based System for Diagnosis of Diabetic Retinopathy","authors":"Misgina Tsighe Hagos, Shri Kant, Surayya Ado Bala","doi":"10.1109/ICCCIS48478.2019.8974492","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974492","url":null,"abstract":"Early diagnosis of diabetic retinopathy for the treatment of the disease has been failing to reach diabetic people living in rural areas. The shortage of trained ophthalmologists, limited availability of healthcare centers, and expensiveness of diagnostic equipment are among the reasons. Although many deep learning-based automatic diagnosis of diabetic retinopathy techniques have been implemented in the literature, these methods still fail to provide a point-of-care diagnosis, and this raises the need for an independent diagnostic of diabetic retinopathy that can be used by a non-expert. Recently the usage of smartphones has been increasing across the world; automated diagnoses of diabetic retinopathy can be deployed on smartphones in order to provide an instant diagnosis to diabetic people residing in remote areas. In this paper, inception based convolutional neural network and binary decision tree-based ensemble of classifiers have been proposed and implemented to detect and classify diabetic retinopathy. The proposed method was imported to a smartphone application for further classification, which provides an easy and automatic system for diagnosis of diabetic retinopathy.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115392110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}