{"title":"Detection of blood vessels in retinal images for diagnosis of diabetics","authors":"A. Jadhav, Pushpa B. Patil","doi":"10.1109/ICISC.2018.8398928","DOIUrl":"https://doi.org/10.1109/ICISC.2018.8398928","url":null,"abstract":"Early detection of blood-vessels in an retinal image and determining diameter of vessels is important for analysis and dealing of different diseases including glaucoma, hypertension and diabetic retinopathy (DR). To detect the blood-vessels in a retinal fundus images, we proposed a method consisting of four main steps. The first step is pre-processing. Initially, the contrasts of the blood vessels are not clear in the original retinal images. To improve the appearance of blood vessels we are using several image enhancement techniques. In the second step we are using various filters to improve the blood-vessels appearance in the retinal images. The third step is, feature extraction where we are extracting Grey Level Co-occurrence Matrix (GLCM) and Discrete Wavelet transform (DWT) features formed a feature vector. Finally we are applying Support Vector Machine (SVM) classifier which classifies the diseases based on the features. With the two publically available databases DRIVE and CHASE_DB1 databases we are comparing and analyzing the performance of proposed method which measures the specificity, sensitivity and accuracy.","PeriodicalId":130592,"journal":{"name":"2018 2nd International Conference on Inventive Systems and Control (ICISC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122146910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Mishra, Raghav Purwar, N. K. Shukla, C. Dwivedi
{"title":"A comparative performance analysis of confinement factor in semiconductor optical amplifier","authors":"R. Mishra, Raghav Purwar, N. K. Shukla, C. Dwivedi","doi":"10.1109/ICISC.2018.8399055","DOIUrl":"https://doi.org/10.1109/ICISC.2018.8399055","url":null,"abstract":"The paper interrogated the performance of SOA hybrid optical amplifier using EDFA improvement for basic CW Laser Source transposal system with channel having data rate of 10 Gbps at moderate channel spacing of 0.2 nm. The performance of the system has been compared for different signal input power on the basis of transmission distance in terms of Output Power, Q-factor, Eye Opening and Bit Error Rate. It is contemplated that the semiconductor optical amplifier with EDFA booster provides high value of Quality-factor, Low Bit Error Rate, Maximum value of Output power and Maximum Eye Opening for −20 dBm signal input power up to transmission distance of 100 km as compared to −10 dBm and 0 dBm signal input power.","PeriodicalId":130592,"journal":{"name":"2018 2nd International Conference on Inventive Systems and Control (ICISC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128320808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs","authors":"G. Inampudi, K. Shyamala, S. Ramachandram","doi":"10.1109/ICISC.2018.8398949","DOIUrl":"https://doi.org/10.1109/ICISC.2018.8398949","url":null,"abstract":"The importance of protecting the information has increased rapidly during the last decades. This motivates the need for cryptographic algorithms. The Acceleration of the symmetric key cryptography algorithm is enhanced using parallel implementation on GPGPUs with Open Computing Language (OpenCL). The General Purpose Graphics Processing Units (GPGPU) enables high level of parallelism with Compute Unified Device Architecture (CUDA)/Open Computing Language (OpenCL) programming environments using (Single Instruction Multiple Data) SIMD architecture. In this paper, the parallel implementation of Advanced Encryption Standard (AES) Algorithm using OpenCL is presented. The experimental results show that, the parallel implementation of encryption algorithm tested on GPUs accelerates the speed when compared to sequential implementation of encryption algorithm. The experimental result shows that, the percentage 99.8% is improved compared to sequential implementation of Encryption algorithm.","PeriodicalId":130592,"journal":{"name":"2018 2nd International Conference on Inventive Systems and Control (ICISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128790517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systematic investigation on LargeScale simulations in big data systems","authors":"Mukesh Soni, Tejas Patel","doi":"10.1109/ICISC.2018.8398885","DOIUrl":"https://doi.org/10.1109/ICISC.2018.8398885","url":null,"abstract":"The generation of data was confined, and it was rare that online systems were counted on for storing the data in earlier systems. All was on paper. With the rise of technology, a digital revolution gas taken place. All the industries, varying from hospitals to small business to social media websites, are working on the concept of sending data to database, further on to servers, and getting back the response from the server that data has been processed either successfully or unsuccessfully through the reflected response message. On the other hand, the worst part, again ironically, is that to handle the enormous data, a high-tech server or the high tech workplace has to be generated. For the handling of this data, the concept of Big Data has come in limelight. The Big Data has rapidly developed and achieved success in almost all the working fields. It helps to synchronize the data sequentially as the action or the processing has been done. The implementation of Big Data has to be done through simulations, the concept of Artificial Intelligence. So, it's evident that handling data storage has migrated from manual processing to artificial intelligence. This paper aims to study the simulation of Big Data at a large scale and how it can help to store the enormous data virtually effectively and efficiently.","PeriodicalId":130592,"journal":{"name":"2018 2nd International Conference on Inventive Systems and Control (ICISC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126706766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Confidentiality, integrity and authentication of DICOM medical images","authors":"M. Brindha","doi":"10.1109/ICISC.2018.8398924","DOIUrl":"https://doi.org/10.1109/ICISC.2018.8398924","url":null,"abstract":"Due to the security threats during transmission of any data, exchange of medical images should be done in a protective manner. This has activated the need for confidentiality, authentication, and integrity of medical images. The confidentiality of header data is achieved from medical image exchange standard but for the pixel information it is not achieved. The pixel information achieves authentication and integrity but the header data does not. In this paper, a crypto-oriented algorithm is proposed which offers confidentially, authentication, and integrity for the header and pixel data. AES-GCM (Advanced encryption Standard-Galois counter mode) and Whirlpool hash function are used for achieving these requirements. Simulations are carried out in order to show that confidentiality, authentication, and integrity have been accomplished by the numerical results of entropy, histogram analysis, and correlation.","PeriodicalId":130592,"journal":{"name":"2018 2nd International Conference on Inventive Systems and Control (ICISC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126708352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA implementation of filtering algorithm for multispectral satellite image","authors":"P. S. Shakila, V. Thyagarajan, S. Rajaram","doi":"10.1109/ICISC.2018.8398953","DOIUrl":"https://doi.org/10.1109/ICISC.2018.8398953","url":null,"abstract":"Onboard processing of remotely sensed multispectral data is a highly desirable goal in many applications. For this aspiration, compact reconfigurable hardware modules such as field programmable gate arrays(FPGAs) are popularly used. In this paper, a hardware implementation of filtering algorithm on multispectral satellite image was proposed. Filtering is a process used to smooth the image. The performance of the system was analyzed in terms of peak signal to noise ratio(PSNR). Verilog language was used for hardware representation and Matlab was used for software processing. The simulation part was carried out using Verilog HDL language in Quartus II tool and implementation was done in Altera cyclone II EP2C20F484C7 using FPGA DE1 kit.","PeriodicalId":130592,"journal":{"name":"2018 2nd International Conference on Inventive Systems and Control (ICISC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126910437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on DC microgrid architecture, power quality issues and control strategies","authors":"G. S. Rawat, Sathans","doi":"10.1109/ICISC.2018.8399123","DOIUrl":"https://doi.org/10.1109/ICISC.2018.8399123","url":null,"abstract":"In the evolving power system, DC micro-grid is an attractive alternate structure given its smooth interface with renewable power sources, electric loads, and storage technology. This paper presents a survey of the important research works already reported focusing on various power quality issues and control strategies related to dc microgrid. Different control concepts such as fuzzy control, droop control, hierarchical control and multi agent based control have been briefly discussed in this paper. Various configurations of DC microgrid have been comprehensively covered and reviewed.","PeriodicalId":130592,"journal":{"name":"2018 2nd International Conference on Inventive Systems and Control (ICISC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123838832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of cost-effective and efficient temperature sensor circuit for total preventive maintenance application","authors":"Rohan V. Sawant, V. Patkar, P. Roy","doi":"10.1109/ICISC.2018.8398864","DOIUrl":"https://doi.org/10.1109/ICISC.2018.8398864","url":null,"abstract":"Modern computers have found an array of applications in industries because they are portable and user-orientated. With their huge expense and the ability to give near 100 percent efficiency, utmost care has to be taken while using them in scathing applications. In such cases, factors like temperature, mechanical stress and environmental pollutants can critically affect the performance of these computing systems and may eventually lead to system breakdowns. This may severely compromise with production efficiency as well as safety of people in and around the plant. This work tries to address the problem concerned with the temperature control of the computing system. In the proposed system, an effective and a low-cost temperature sensor circuit has been designed and implemented to monitor the panel temperature in case the panel air conditioner undergoes failure. If the temperature of the panel rises above a predefined threshold, an alarm will be generated which will be displayed on the computer screens of the respective authorities via Ethernet connection.","PeriodicalId":130592,"journal":{"name":"2018 2nd International Conference on Inventive Systems and Control (ICISC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123200781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges for the preliminary technological development in the health network system of wireless sensors","authors":"K. K. Kumar, G. Narayana, M. Venunath, Syed Umar","doi":"10.1109/ICISC.2018.8398989","DOIUrl":"https://doi.org/10.1109/ICISC.2018.8398989","url":null,"abstract":"Recent developments in e Government efforts have led to changes in internet, technology and the global web to provide better access to citizens and businesses as governments in their internal operations. One of the revolutionary developments is the adoption of wireless technology in government activities. E-governance is an instrument that influences the management of governance processes in developing countries. E-governance works on the interface between information and communication technology (ICT) and the governance process (GP). An effective governance model is a system that is systematically applied to specific areas of health. Given that e-governance is involved in the transfer of global technology from the context of the project into different social contexts. Community Health Services is a collaboration program between clinical medical programs and the Department of Health Systems; The management and health and health system is an interdisciplinary program that assesses, provides and devotes to healthcare to the public. This is a response that gives the government access to information from all sectors and gives them valuable advice. The need to gather data on the physical, physiological, psychological, cognitive and social processes of urban and rural behaviour of urban spaces. In this document, we mention the availability of the latest technologies that enable the collection, storage, retrieval and security of information systems through wireless sensor networks for healthcare. In this work, we describe a prototype system that includes the application of physiological monitoring and the activity of urban and rural hospitals and labour, and focuses on the challenges of daily care and information. Then the higher authority can check at any time.","PeriodicalId":130592,"journal":{"name":"2018 2nd International Conference on Inventive Systems and Control (ICISC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123387129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review on inter-cluster and intra-cluster similarity using bisected fuzzy C-mean technique via outward statistical testing","authors":"Neha B. Nikhare, P. Prasad","doi":"10.1109/ICISC.2018.8399066","DOIUrl":"https://doi.org/10.1109/ICISC.2018.8399066","url":null,"abstract":"Clustering is one of the most important fields of data mining which has a large number of applications in practice. Automatic clustering is done when the input data size cannot be link with the number of clusters are unknown. In the existing research the researchers have performed via Outward Statistical Testing on Density metrics. This performs automatic clustering on data but does not have good Inter-cluster and Intra-cluster similarity metrics. This drawback can remove if we introduce Bisected clustering algorithm like bisecting k-means or bisecting FCM. Our research is to check the performance analysis of existing technique and improve it using Bisected clustering algorithm.","PeriodicalId":130592,"journal":{"name":"2018 2nd International Conference on Inventive Systems and Control (ICISC)","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}