{"title":"A fast collaborative filtering approach for web personalized recommendation system","authors":"Fayaz Dafedar, K. Bharati","doi":"10.1109/ICICES.2017.8070755","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070755","url":null,"abstract":"Collaborative Filtering (CF) is that the most significant technology that is employed in recommender systems (RS). However, this CF techniques area unit plagued by issues like quality in recommendation, big-error in predictions and data sparsity. A unique characteristic of TYCO is obtaining ‘neighbours’ based on typicality degree of user. In the collaborative web personalized Recommender system (WRS) the recommendations are created by similarity measure supported entropy so as to recommend the advice to the users of the system. Primarily the entropy based similarity is calculated between the users so as to realize quantifiability. Based on this entropy based similarity the online recommendations are going to generate and further suggestions can be given to the users based on their previous data and preferences. Moreover the proposed system can procure most accurate predictions with lesser big-error predictions.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132984448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A video target tracking using shadow suppression and feature extraction","authors":"D. Mohanapriya, K. Mahesh","doi":"10.1109/ICICES.2017.8070734","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070734","url":null,"abstract":"In real-time application, most of the research is focused in video tracking system. Since this is mainly used for the application of robotics, surveillance tracking, human to machine interface, etc. to extract the target status. There are more number of video tracking system to identify the targeted region from the frame of given video. Since the performance of tracking can affect by sudden illumination changes, shadowing effect and uneven background. In moving object detection system, it suffers from dynamic background changing and shadow effect present in the video frames. Due to this, tracking of targeted region may misclassified and results in false detection of moving objects. To rectify this problem there are many techniques to detect and eliminate the shadow from frames like K-Means clustering, Fuzzy C-Means, etc. which are to segment both foreground and background from each frames. Then they remove/suppress shadow region and track the target. Since in that methods, segmentation is based on non-changing background of surveillance area. To rectify this problem, we propose a novel background normalization technique which is based on textural pattern analysis. In texture based system, there are several methods perform texture pattern extraction to verify the feature matching for target region analysis. In this work, we present a novel model of background clustering by using Neighborhood Chain Prediction (NCP) algorithm for uneven background. Here we also propose Differential Boundary Pattern (DBP) to extract texture of the frame for suppressing shadow pixels present in the frame. This is done by estimating lowest intensity present in that frame and predict the area by using DBP method and enhance the pixel to suppress shadow region. From this equalized frame of the given video, we split the frame into several grids. Then from that grid formatted frame, we extract histogram features of the targeted frame and provide classification for each grid in that frame. In that classification can be done by using Machine Learning Classification (MLC) method. This matched grid is consider as the tracked region and provide binary label to separate background and foreground. This type of visual tracking system is robust over sudden illumination changes and dynamic background by using the texture pattern analysis. Our Proposed work can be compare with existing segmentation approaches for the parameters of True Positive (TP), True Negative (TN), False Positive (FP), False Negative (FN), Sensitivity, Specificity, Accuracy, Correction rate, Positive likelihood and Negative likelihood for the tracking of targeted region.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122409872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis of tongue shape to identify diseases by using supervised learning techniques","authors":"G. Devi, E. Anita","doi":"10.1109/ICICES.2017.8070786","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070786","url":null,"abstract":"The tongue is a basic organ in Traditional Chinese Medicine (TCM). Tongue image diagnoses the health status of a human based on shape characteristics of the tongue. Tongue shape is a very important feature in tongue diagnosis. Different tongue shapes like circle, rectangle and triangle indicate presence of certain pathologies. In this paper, we propose a method for automated recognition of diseases based on the shape of a tongue image using supervised machine learning techniques. Experimental results obtained with a set of tongue images demonstrate that the SVM classifier improves the current state of the art method.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122528403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring Fishy activity of the user in social networking","authors":"Mercy Paul Selvan, R. Selvaraj","doi":"10.1109/ICICES.2017.8070737","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070737","url":null,"abstract":"With the high usage of internet today, people started sharing much of the information with each other online. In this paper, we propose to monitor user activity for any hazardous behavior like terrorism on Gmail and Twitter. We apply Natural Language Processing (NLP) techniques like POS tagging, Chunking, Stemming, and WordNet Processing to extract the keyword and check to see whether the information is normal or little suspicious or offensive.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130508427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative performance analysis of gate-inside, gate-outside and gate-inside&outside cylindrical junctionless silicon nanotube FET","authors":"R. Ambika, R. Srinivasan","doi":"10.1109/ICICES.2017.8070771","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070771","url":null,"abstract":"In this paper, the performance investigation of Gate-Inside (GI), Gate-Outside (GO) cylindrical Junction-less Silicon Nanotube Field Effect Transistor (JLSiNT) devices and comparative analysis with Gate-Inside & Outside (GIO) JLSiNT device are done using 3D TCAD numerical simulations. ON current (I<inf>ON</inf>), OFF current (I<inf>OFF</inf>), Sub-threshold Swing (SS), Threshold voltage (V<inf>TH</inf>), Trans-conductance (g<inf>m</inf>), Output resistance (R<inf>OUT</inf>), Gate capacitance (C<inf>GG</inf>) and unity gain cutoff frequency (f<inf>T</inf>) are extracted for the above devices. For the matched I<inf>OFF</inf> scenario, GI shows better I<inf>ON</inf> but GO offers better f<inf>T</inf> since it has lower C<inf>GG</inf> comparatively. GIO device shows better SS and R<inf>OUT</inf> comparatively.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133686690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The effects of change in statistical properties of datasets on feature selection stability","authors":"P. M. Chelvan, K. Perumal","doi":"10.1109/ICICES.2017.8070728","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070728","url":null,"abstract":"Data mining extracts previously not known knowledge from huge amount of stored operational data of organizations which can be used for managerial decision making. The datasets are mostly high dimensional due to the advancements in information and communication technologies. Feature selection is an important dimensionality reduction technique to manage the “curse of dimensionality”. The subset of features selected in subsequent iterations of feature selection algorithms must be same or at least similar for the small perturbations of the experimental dataset. The robustness of feature selection algorithms is called as the feature selection stability. High data quality with security/privacy is the major requirement of good privacy preserving data mining technique. This paper explores the change in statistical properties of datasets due to perturbations of datasets by the privacy preserving data mining techniques and their effects in feature selection stability.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"251 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133586775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Krishnamoorthy, S. Manikandan, M. MohamedShalik, S. Samy
{"title":"Border alert system and emergency contact for Fisherman using RSSI","authors":"E. Krishnamoorthy, S. Manikandan, M. MohamedShalik, S. Samy","doi":"10.1109/ICICES.2017.8070766","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070766","url":null,"abstract":"Augmenting strains over the ocean fringes brought on much devastation between two nations. Anglers from any nation are being snatched by the naval force for intersection the fringe which is accidental the majority of the circumstances. The viable generation of this framework manages following the area of the watercraft using RSSI, it gives solid arranging route and timing facilities to overall clients on a consistent substructure in all climate, day and night on or proximate to earth and trigger an exhortation message, when the outskirt is drawn nearer or crossed. Withal, in additional organize, the RSSI data is sent to costal sentinel and the celerity of the watercraft motor gets off by the control of fuel supply to motor. Subsequently sentinels in the shore can profit and give supplemental benefit to the anglers and profit them not to move past the outskirt.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116363367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Indhu, K. M. Shreemathi, J. Mercy, S. Radha, S. Kirubaveni, B. S. Sreeja
{"title":"Design of PDMS membrane for CTC separation","authors":"R. Indhu, K. M. Shreemathi, J. Mercy, S. Radha, S. Kirubaveni, B. S. Sreeja","doi":"10.1109/ICICES.2017.8070770","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070770","url":null,"abstract":"Circulating tumorcells(CTC) are the primary tumor cells which contains the key information about the cancer. These CTCs can be separated from the peripheral blood in microfluidics, where a PDMS(polydimethylsiloxane) membrane can be designed for CTC detection. The PDMS membrane is designed with cylindrical pores for the detection of Circulating TumorCells(CTC) from the peripheral blood samples. The membrane consisting of cylindrical pores of size 9μm and the distance between the pores are designed to be (15μm) are simulated and analysed for the separation of CTCs.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134142103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient and secure server migration on cloud storage with VSM and dropbox services","authors":"J. A. Mayan, D. Anand, Neha Sadhvi","doi":"10.1109/ICICES.2017.8070725","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070725","url":null,"abstract":"The huge amount of sensitive data store in centralize storage space in cloud server, which is most important for providing the result based on the user's provided keywords. These service providing high efficiency with keeping user privacy. Without any configure the existing system learn plain text information. CSP (Cloud Service Provider) have outsourced data control in this condition because of some issue. There may survive unconstitutional operation on outsourced information on relation of profit or curiosity. Hence, privacy data has to encrypt for security. In existing search method over encrypted data in cloud support KNN search keyword not multi-keyword rank search based on semantics approach. The search methods aren't intelligent also neglect a few semantically associated documents. In vision of attempt, deficiency an efficient method is suggested to solve multi rank search keyword issue over encrypted information similar search clarification sustaining synonym queries over encrypted information in cloud. To overcome these problems we proposed DMRS search and VSM (Vector Space Model) algorithm. These two algorithms give top ranking search consequence and Security in the cloud storage system.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133887189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Pradeepa, S. Krishnan, M. D. Dharshinii, S. Akshaya
{"title":"Implementation of interleaved soft switching boost converter and H-bridge inverter for solar pv power generation system to attain maximum output voltage and reduced harmonics","authors":"K. Pradeepa, S. Krishnan, M. D. Dharshinii, S. Akshaya","doi":"10.1109/ICICES.2017.8070778","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070778","url":null,"abstract":"Solar energy is a non-conventional type of energy. Only a small fraction of the available solar energy is used in practice. Solar powered electrical generation relies on photovoltaic system and heat engines. To harvest the solar energy, the most common way is to use photovoltaic panels which will receive photon energy from sun and convert to electrical energy. The efficiency of PV module is very low and power output depends on solar insulation level and ambient temperature, so maximization of power output with greater efficiency is of special interest. In this paper, an interleaved soft switching boost converter (ISSBC) for a photovoltaic (PV) power-generation system is proposed. The topology used raises the efficiency for the dc/dc converter of the PV power conditioning system (PVPCS), and it minimizes switching losses by adopting a resonant soft-switching method. This project proposes a novel soft-switching interleaved boost converter composed of two shunted elementary boost conversion units and an auxiliary inductor. The proposed controller scheme utilizes PWM techniques to regulate the output power of interleaved boost converter at its maximum possible value and simultaneously controls the charging process of battery. This converter is able to turn on both the active power switches at zero voltage to reduce their switching losses and evidently raise the conversion efficiency. Since the two parallel-operated elementary boost units are identical, operation analysis and design for the converter module becomes quite simple. The resulting system has high-efficiency, lower-cost, very fast tracking speed. The circuit will be simulated using MATLAB Simulink.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122281789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}