2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)最新文献

筛选
英文 中文
Regular Expression Based Pattern Matching for Gene Expression Data to Identify the Abnormality Gnome 基于正则表达式的基因表达数据模式匹配识别异常基因组
L. Sharmila, U. Sakthi, A. Geethanjali, S. Sagadevan
{"title":"Regular Expression Based Pattern Matching for Gene Expression Data to Identify the Abnormality Gnome","authors":"L. Sharmila, U. Sakthi, A. Geethanjali, S. Sagadevan","doi":"10.1109/ICRTCCM.2017.71","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.71","url":null,"abstract":"The main idea of this paper is to detect and extract an input pattern from a gene expression dataset. Human behavior and health conditions can be identified and classified through their genomic data in accurate manner. In this paper it is motivated to search and identify the abnormal pattern availability in a gene expression data. To do this a Regular Expression based Pattern Matching (REPM) method is proposed for detecting, identifying and counting number of abnormal pattern occurrences in a given dataset. This approach is experimented in MATLAB software the results verified to check the efficiency of REPM method.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123182150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Survey: Handling on Difficulties in Internet of Things (IoT) Applications and Its Challenges 调查:处理物联网应用中的困难及其挑战
S. Rajkumar, L. Deborah
{"title":"Survey: Handling on Difficulties in Internet of Things (IoT) Applications and Its Challenges","authors":"S. Rajkumar, L. Deborah","doi":"10.1109/ICRTCCM.2017.80","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.80","url":null,"abstract":"Internet of things in broader sense and importance on protocols, technologies and application along related issues, is a collection of application and information mining system to naturally find and assembled data from web archives and administrations which can be in organized, unstructured or semi-organized form. Accuracy and relevance of information extracting from the internet is the most significant issue of concern for the realization of Data. Fast improvement of PC and data innovation a huge measure of tera-byte to peta-bytes information will ceaselessly be produced in huge scale, either being stored in massive storage devices or streaming into and out of the framework as information streams. Information mining, as the conjunction of various entwined disciplines, including insights, machine learning, design acknowledgment, database frameworks, data recovery, World-Wide Web, perception, and numerous application spaces, has gained awesome ground in the previous decade. The overview about IoT technologies, protocols and applications and related issues with comparison of other survey papers. Our main aim to provide a framework to researcher and application developer that how different protocols works, over view of some key issues of IoT and the connection amongst IoT and other embryonic advances including huge information examination and distributed computing.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128970161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Social Influence Algorithms and Emotion Classification for Prediction of Human Behavior: A Survey 用于预测人类行为的社会影响算法和情感分类:综述
P. Nedunchezhian, S. Jacob
{"title":"Social Influence Algorithms and Emotion Classification for Prediction of Human Behavior: A Survey","authors":"P. Nedunchezhian, S. Jacob","doi":"10.1109/ICRTCCM.2017.82","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.82","url":null,"abstract":"Emergence of big data is directly proportional to the data shared in social media. Audio, video, text or the combination of all the above are the data shared in social media. Social networking is achieved by Social Networking Sites (SNS). In real world business, analysts use software tools to analyze product sales, promotion of brand and also tend to identify influential factors that impact their business. In this paper, the authors present the evolution and importance of social networks. Majority of the research work on influence models and algorithms are based on greedy algorithms and relay on influence models like Independent Cascade (IC) model, Linear Threshold (LT) model etc. The research survey presented here gives the overview of influence in social networks and human behavior that includes both cooperative and non-cooperative nature. The limitations in influencing users and the networks used are discussed in this survey and the objective is to explore current research issues in human behavior prediction from social networks.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131812455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mathematical Modelling and Comparative Analysis of PWM Techniques for Photovoltaic Fed HERIC Inverter 光伏馈入式HERIC逆变器PWM技术的数学建模与对比分析
V. Thiyagarajan, P. Somapasundaram
{"title":"Mathematical Modelling and Comparative Analysis of PWM Techniques for Photovoltaic Fed HERIC Inverter","authors":"V. Thiyagarajan, P. Somapasundaram","doi":"10.1109/ICRTCCM.2017.65","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.65","url":null,"abstract":"Grid connected photovoltaic inverters play an important role to achieve an effective and efficient system with reduced total cost of the system. The photovoltaic inverters convert the dc source and delivered into the ac system. The main aim of this paper is to analyse the performance of HERIC inverter for photovoltaic applications for different Pulse-Width Modulation (PWM) techniques. The two different reference signals such as sinusoidal reference signal and trapezoidal reference signal are used. A triangular carrier signal is compared with those reference signals and generates PWM pulses. The mathematical model of HERIC inverter is developed using MATLAB/Simulink. The performance indexes used in this comparison are THD, fundamental output voltage and RMS value of output voltage.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134413161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Based Automated Wheelchair Control 基于Android的自动轮椅控制
R. J. Leela, A. Joshi, B. Agasthiya, U. K. Aarthiee, E. Jameela, S. Varshitha
{"title":"Android Based Automated Wheelchair Control","authors":"R. J. Leela, A. Joshi, B. Agasthiya, U. K. Aarthiee, E. Jameela, S. Varshitha","doi":"10.1109/ICRTCCM.2017.44","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.44","url":null,"abstract":"The physically challenged people are having the difficulties in walking due to illness, injury, or disability. The proposed system is easy and efficient to solve the problem of physically challenged people and also it has the best functionality and it is simple and low cost. Wheelchair provides mobility which does not depend, the ability to participate in society and earn a living. The handicapped person gives their voice to the android mobile, output of the Android mobile is voice command that is converted into text. The output of the mobile is given to the microcontroller and the proposed system movement is controlled using Bluetooth module with the help of DC motors. This proposed system has battery powered wheelchair with DC motors. Also an ultrasonic sensor is used to detect the obstacle.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129704925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Improved Version of Se-Drip Model for Data Dissipation Using Se-Small 基于Se-Small的数据耗散Se-Drip模型的改进版本
M. Lydia, S. Saravanan
{"title":"An Improved Version of Se-Drip Model for Data Dissipation Using Se-Small","authors":"M. Lydia, S. Saravanan","doi":"10.1109/ICRTCCM.2017.42","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.42","url":null,"abstract":"The future healthcare systems' growth and development have greater dependence on Wireless Body Area Network (WBAN). Notwithstanding, the utilization of untrustworthy methods has made it defenseless against various attacks. These attacks can be kept under check by utilizing different security procedures. For this reason a security protocol named Se-Small is utilized. The procedure includes signing the primary packet by the base station before it is transmitted. Subsequently this sign is transmitted to the rest of the data item from which hash value is produced. This procedure reduces overhead and transmission delay in the system. The wireless network essentially utilizes three distinct structures for packet transmission. They incorporate – Tree, Star and Linear chain. This paper uncovers the utilization of flawlessly displayed and distributed structure where the three essential structures have been assembled for productive transmission of packets in WBAN. For this reason Fish-Bone structure is utilized. Failure in any of the cluster head has likewise been compensated by giving a substitute component. Mobile node is utilized here to gather the information from master heads. For proficient transmission buffer length of mobile node is kept high.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132216653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV Assisted Automated Remote Monitoring and Control System for Smart Water Bodies 无人机辅助智能水体自动远程监控系统
P. Perumal, A. Raj, B. Bharathi, G. M. Raju, K. Yogeswari
{"title":"UAV Assisted Automated Remote Monitoring and Control System for Smart Water Bodies","authors":"P. Perumal, A. Raj, B. Bharathi, G. M. Raju, K. Yogeswari","doi":"10.1109/ICRTCCM.2017.85","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.85","url":null,"abstract":"Water is a scarce resource and hence it should be used efficiently in all aspects. Water bodies like dams, lakes, ponds play major role in storing and distributing the water in efficient manner. Stored water is used for drinking purpose, agriculture irrigation, electricity generation, etc. Sometimes excess storage of water causes flood during heavy raining season and kills valuable resources including human life. This mandates that the water bodies should be frequently monitored and controlled for the benefits of mankind. Water body monitoring involves the quantity and quality of water stored, input and output water flow through inlet and outlet shutters respectively, condition of the inlet and outlet shutters, condition of the channels carry the water to oceans during flood, etc. Conventional manual monitoring of water bodies consists several disadvantages including high manual overhead, low accuracy and excess time in measurements, high communication delay, high cost, life threatening risks during measurements, etc. The objective of the proposed work is to automatically monitor and control the smart water bodies to sort out the disadvantages of conventional monitoring. The proposed system consists of Remote Monitoring and Control Station (RMCS), Field Control Unit (FCU), Patrol Unmanned Aerial Vehicle (PUAV), different floating sensors like rainfall sensor, water quality sensor, inlet and outlet shutter interfaces, alarms. The proposed system is able to monitor the water body frequently and prepares accurate report that includes quantity of water, rainfall rate, input and output water flow rate, quality of water like existence of any poisonous chemical contents, working condition of the inlet/outlet shutters, etc. This report is quickly sent to the RMCS for further actions. The RMCS can pull the complete report or any particular information on demand. Further the RMCS processes the report to extract the knowledge for further actions like opening/closing shutters, replacing damaged sensors, directing PUAVs to capture the pictures, sending messages to field officials and operators, etc. As a whole, the proposed system significantly reduces the manual overhead, cost, time required to measure/check various factors while increasing the accuracy of measurements and enables the remote monitoring unit to monitor and govern the water body in all aspects.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127118703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Author Similarity Identification Using Citation Context and Proximity 基于引文上下文和接近度的作者相似度识别
Vasantha Kumar, S. Sendhilkumar, G. Mahalakshmi
{"title":"Author Similarity Identification Using Citation Context and Proximity","authors":"Vasantha Kumar, S. Sendhilkumar, G. Mahalakshmi","doi":"10.1109/ICRTCCM.2017.46","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.46","url":null,"abstract":"This paper presents an overall analysis on the similarity between the authors and identify the authors doing similar work in the domain of the ACL Anthology. Similar works deal only with the frequency of citations and the citation content analysis. We tried to bring out the relationship between the authors working in the similar domain with the help of semantically analyzing the citation context and with proximity analysis.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116482014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Graph-Based Mathematical Model for an Efficient Load Balancing and Fault Tolerance in Cloud Computing 基于图的云计算高效负载均衡与容错数学模型
R. Devi, G. Murugaboopathi, P. Vijayakumar
{"title":"A Graph-Based Mathematical Model for an Efficient Load Balancing and Fault Tolerance in Cloud Computing","authors":"R. Devi, G. Murugaboopathi, P. Vijayakumar","doi":"10.1109/ICRTCCM.2017.25","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.25","url":null,"abstract":"All the Cloud Data Centers (CDC) provision service ranging from compute to storage. The rate of service accessed by the end users increases drastically. Hence, to deal with an ondemand dynamic loads, an efficient load balancing of resources such as hosts and virtual machines in the CDC becomes necessary. This paper proposes a load balancing technique based on a graph structure called weighted complete graph augmented with dominating set concept for the CDC is proposed. A mathematical model is devised and the proposed method improves utilization of resources in CDC by load balancing and also enables fault tolerance.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123924349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Classification of Pathological Magnetic Resonance Images of Brain Using Data Mining Techniques 基于数据挖掘技术的脑病理磁共振图像分类
R. Ramani, K. Sivaselvi
{"title":"Classification of Pathological Magnetic Resonance Images of Brain Using Data Mining Techniques","authors":"R. Ramani, K. Sivaselvi","doi":"10.1109/ICRTCCM.2017.48","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.48","url":null,"abstract":"Medical image analysis is a pioneer research domain due to the challenges posed by different kinds of images and the complexities in attaining the accurate prediction of abnormalities presence. Brain MRI classification into normal and abnormal has received increasing attention because of the high level of difficulty in handling those huge numbers of images. Recently, many computational techniques are widely employed to segregate the normal images from pathological. Thus, this study has attempted to analyse the capability of various supervised data mining techniques in classifying the brain MR images. Initially, the images are pre-processed and the volumetric features are extracted. Then, these are fed into feature selection techniques viz. Principal Component Analysis, Runs, Fisher filtering and ReliefF feature selection to determine relevant features. The selected features are utilised for the supervised data mining techniques viz. Naive Bayes, Support Vector Machine, Random Tree and C4.5 to identify the abnormal images of brain. Among them, SVM has achieved highest accuracy of 71.33% with the features extracted through ReliefF feature selection with Leave-One-Out cross validation. Random Tree achieved accuracy of 82% with Runs filtered features. The classification will aid the segmentation of brain tumor from large set of MRI slices by eliminating the normal slices. This greatly reduces the computational time and memory required for the process of segmentation.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信