2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)最新文献

筛选
英文 中文
Stacked Autoencoders Based Deep Learning Approach for Automatic Epileptic Seizure Detection 基于堆叠自编码器的深度学习方法用于癫痫发作自动检测
Kuldeep Singh, J. Malhotra
{"title":"Stacked Autoencoders Based Deep Learning Approach for Automatic Epileptic Seizure Detection","authors":"Kuldeep Singh, J. Malhotra","doi":"10.1109/ICSCCC.2018.8703357","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703357","url":null,"abstract":"Epilepsy is one of the major chronic nervous disorders, which affects the lives of millions of patients per annum globally, because of occurrence of sudden death or major injuries occurred during walk, driving or working in hazardous work environment. Its prognosis through modern technologies is the need of the day, which is attaining worldwide attention in research community with the use of latest technologies like internet of things, machine learning and cloud computing. This paper presents a model of automatic epileptic seizure detection model using Stacked Autoencoders based deep learning approach, which is an advanced form of machine leaning, employed for effectively handling the problem of big data with reduced complexity and processing time and to make this process more real time compatible with least delays. This model processes the sensed EEG signals by breaking it into short duration segments. Then, these EEG segments are fed to Stacked Autoencoders for its classification into different epileptic seizure stages like normal, preictal and ictal. The performance of this model has been compared with other existing models consisting of higher order spectral analysis based feature extraction and classification using traditional machine learning algorithms like Bayes Net, Naïve Bayes, Multilayer Perceptron, Radial basis function neural networks and C4.5 decision tree classifier. The analysis of performance through simulation results reveal that Stacked Autoencoders based deep learning approach is an efficient model for real time automatic epileptic seizures detection at early stage with classification accuracy 88.8%, sensitivity 89.44%, specificity 93.77% values and least value of processing time, which is approximately 23 times lesser than that of models utilizing traditional higher order statistics feature extraction and machine learning based classification approaches.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133470613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Local Binary Pattem Variants: A Review 局部二进制模式变体:综述
Anterpreet Kaur Bedi, R. K. Sunkaria, Simarjot Kaur Randhawa
{"title":"Local Binary Pattem Variants: A Review","authors":"Anterpreet Kaur Bedi, R. K. Sunkaria, Simarjot Kaur Randhawa","doi":"10.1109/ICSCCC.2018.8703326","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703326","url":null,"abstract":"Local Binary Pattern (LBP) is a non-parametric descriptor that is used to study various local structures of an image. It is considered as simple and efficient texture operator for image analysis in challenging real-time situations. It has been applied successfully for various applications of computer vision and image processing, like pattern recognition, texture analysis, face detection, image retrieval etc. This paper covers different LBP variants in spatial domain, which were created in order to improve its robustness and efficiency.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115071446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Opinion Mining and Classification of Music Lyrics Using Supervised Learning Algorithms 使用监督学习算法的意见挖掘和音乐歌词分类
M. Ahuja, A. L. Sangal
{"title":"Opinion Mining and Classification of Music Lyrics Using Supervised Learning Algorithms","authors":"M. Ahuja, A. L. Sangal","doi":"10.1109/ICSCCC.2018.8703292","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703292","url":null,"abstract":"Music Lyrics is an important and meaningful part of any song that are helpful in investigations and classification of opinion (sentiment) develop from it. Opinion mining is also referred as sentiment analysis is the field of data processing that is used to find out opinion of an author, user and subjectivity from text. In this work we are considering only the English lyrical part of a song. WorldNet knowledge is then incorporate to find out synonyms of words. The Goal of this research is doing a linguistic investigation of music lyrics whether these songs useful for listeners or not and classifying them with positive and negative fulfilled present in them. In Order to evaluate this words involve opinion(sentiment) have been investigate with using POS tagger and classifying them into mood categories using different machine learning algorithms(supervised) Random Forest, Gradient Boosting and Voting Classifier(including logistic regression, Decision Tree and SVM) and compare with different parameters.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124323011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Performance Analysis of Reference Point Group Mobility Model for Mobile Ad hoc Network 移动自组网参考点群移动模型的设计与性能分析
P. Dorge, Samiksha L. Meshram
{"title":"Design and Performance Analysis of Reference Point Group Mobility Model for Mobile Ad hoc Network","authors":"P. Dorge, Samiksha L. Meshram","doi":"10.1109/ICSCCC.2018.8703317","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703317","url":null,"abstract":"A Mobile Adhoc Network is a network which is made up numerous mobile nodes, that are wireless in nature and they self-organize themselves to form an environment with an arbitrary and ever-changing topology. These networks do not have any pre-established infrastructure and they do not require some central management. Each of the mobile station in MANET can work as source, receiver and router then they have no restrictions to move anywhere in the network. MANETs can be uses in various civilian and military applications such as classrooms, battlefields and tragedy management activities. In such scenarios, we find correlated movement among the nodes. The Reference Point Group Mobility (RPGM) model is based on correlated node mobility. This work demonstrates design and performance analysis of RPGM model, with the help of the reactive routing protocols (RPs) like AODV which is Ad hoc On-demand Distance Vector and AOMDV which is Ad hoc On demand Multipath Distance Vector. The network simulator NS2 has been used to perform the simulations.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116246696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Smart Automatic Control and Monitor Water Purification Using Wireless Sensor System 智能自动控制和监测用水净化无线传感器系统
Bhupesh B. Lonkar, R. Nakhate, M. R. Sayankar
{"title":"Smart Automatic Control and Monitor Water Purification Using Wireless Sensor System","authors":"Bhupesh B. Lonkar, R. Nakhate, M. R. Sayankar","doi":"10.1109/ICSCCC.2018.8703291","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703291","url":null,"abstract":"Water is most important substance on the earth. Water is resource consumed by human, animal and plants for its survival. The most of the water has stored in river, pond and tank. The quality of stored water is major issue in day to day life. It affects the health of human being. The design model has worked on the wireless sensors system to find out the quality measures of water. It implements PH, Turbidity, ultrasonic and temperature sensors for providing good quality of water in tank. The system connects with the microcontroller to take the inputs from the sensors and controller to perform the operation on given inputs. Server will received the information to server and send to the client system for further taking action.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123681599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Economic Analysis of Reactive Power Services in Deregulated Power Market Integrated with Doubly Fed Induction Generator Wind Unit 与双馈风力发电机组相结合的无功市场经济分析
Aditi Gupta, Y. P. Verma, A. Chauhan
{"title":"Economic Analysis of Reactive Power Services in Deregulated Power Market Integrated with Doubly Fed Induction Generator Wind Unit","authors":"Aditi Gupta, Y. P. Verma, A. Chauhan","doi":"10.1109/ICSCCC.2018.8703281","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703281","url":null,"abstract":"In this article, economic impact of reactive power services in pool based deregulated power market integrated with wind units is analyzed. Reactive power cost of different generators including fixed speed wind units and doubly fed induction generator based variable speed wind units is calculated using the concept of loss of real power spinning reserve cost by using loading capability curve. The proposed optimization model is validated and implemented on a modified 5-bus test system and is then extended to a larger IEEE 24-bus RTS system using GAMS 23.4 software in interfacing with MATLAB 7.0. Results reveal better financial and technical performance of DFIG based wind farms as compared to fixed speed wind farms in reactive power management.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122444541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Color-Based Approach for Melanoma Skin Cancer Detection 基于颜色的黑色素瘤皮肤癌检测方法
Shalu, A. Kamboj
{"title":"A Color-Based Approach for Melanoma Skin Cancer Detection","authors":"Shalu, A. Kamboj","doi":"10.1109/ICSCCC.2018.8703309","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703309","url":null,"abstract":"Skin cancer cases are continuously arising from the past few years. Broadly skin cancer is of three types: Basal Cell Carcinoma, Squamous Cell Carcinoma, and Melanoma. Among all its types, melanoma is the dangerous form of skin cancer whose treatment is possible only if it is detected in early stages. Early detection of melanoma is really challenging. Therefore, various systems were developed to automate the process of melanoma skin cancer diagnosis. Features used to characterize the disease play a very important role in the diagnosis. It is also very important to find the correct combination of features and the machine learning techniques for classification. Here, a system for the melanoma skin cancer detection is developed by using a MED-NODE dataset of digital images. Raw images from the dataset contain various artifacts so firstly preprocessing is applied to remove these artifacts. Then to extract the region of interest Active Contour segmentation method is used. Various color features were extracted from the segmented part and the system performance is checked by using three classifiers (Naïve Bayes, Decision Tree, and KNN). The system achieves an accuracy of 82.35% on Decision Tree which is greater than other classifiers.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121179181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Statistical Analysis and Forecasting Models for Stock Market 股票市场的统计分析与预测模型
Sourabh Yadav, K. P. Sharma
{"title":"Statistical Analysis and Forecasting Models for Stock Market","authors":"Sourabh Yadav, K. P. Sharma","doi":"10.1109/ICSCCC.2018.8703324","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703324","url":null,"abstract":"In the present era of the world, Stock market has become the place of high risks, but even then it is attracting the mass because of its high return value. Stock market tells about the economy of any country. Today, Stock market has become one of the biggest investment place for general public. In this manuscript we put forward the various forecasting approaches for predicting the BSE SENSEX using various forecasting models like ARIMA, BoxCox, Exponential Smoothing, Mean Forecasting, Naive, Seasonal Naive, Neural Network, and then comparing their mean error for deducing the best suitable model. The analysis is done on the Bombay Stock Exchange(BSE) SENSEX. Results of this analysis shows that, the Exponential smoothing and Neural network gives the best results if we compare the mean error of the both models with the other models.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"17 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125785621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Self-Organizing Sustainable Spectrum Management Methodology in Cognitive Radio Vehicular Adhoc Network (CRAVENET) Environment: A Reinforcement Learning Approach 认知无线电车载自组织网络环境下的自组织可持续频谱管理方法:一种强化学习方法
K. Ghanshala, Sachin Sharma, S. Mohan, Lata Nautiyal, P. Mishra, R. Joshi
{"title":"Self-Organizing Sustainable Spectrum Management Methodology in Cognitive Radio Vehicular Adhoc Network (CRAVENET) Environment: A Reinforcement Learning Approach","authors":"K. Ghanshala, Sachin Sharma, S. Mohan, Lata Nautiyal, P. Mishra, R. Joshi","doi":"10.1109/ICSCCC.2018.8703268","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703268","url":null,"abstract":"The era of new and emerging technologies demand that the new challenges they bring about to be effectively tackled and resolved. One such key challenge is spectrum management, especially in Cognitive Radio Vehicular Adhoc Network (CRAVENET) environment. The large-scale deployment of multimedia and Internet of Things (IoT) applications generate the need to establish an efficient spectrum allocation mechanism. This paper proposes a centralized self-organizing spectrum management in the context of economic and social sustainability using reinforcement learning technique. The objective of the proposed approach facilitates economic and social justice. The social economic justice architecture is developed through a user demand level concepts. The spectrum management methodology has been developed in a CRAVENET environment for better quality of service (QoS) with low average latency. The proposed methodology is expected to be highly effective for its economic feasibility, social impact, user comfort, efficiency, and communication latency minimization requirements.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126006799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Vertical Tunnel-FET Analysis for Excessive Low Power Digital Applications 过低功耗数字应用的垂直隧道-场效应管分析
Shailendra Singh, B. Raj
{"title":"Vertical Tunnel-FET Analysis for Excessive Low Power Digital Applications","authors":"Shailendra Singh, B. Raj","doi":"10.1109/ICSCCC.2018.8703312","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703312","url":null,"abstract":"In this paper we study for the imminent novel Vertical Tunnel-FET(TFET) fascinating device for excessive low power digital circuit application because of its Subthreshold slope or swing (S) and low I-OFF current. As MOSFET are scaled down below the 45nm, the problems arises such as short channel effects, the I-OFF leakage current grow drastically because to the non-versatility of edge voltage as the Subthreshold Slope or swing (S) is restricted to 60mV/decade. As Tunnel FETs smothered the point of confinement of 60mV/decade by utilizing quantum-mechanical Band-2-Band Tunneling (B2BT) due to which the performance of this circuit for low power applications improved. This outline paper will examine about the substitution of the CMOS with different structures among which Vertical Tunnel Field Effect Transistor (TFET) found to be greater energy efficiency with improved $mathrm{I}_{mathrm{O}mathrm{N}}$ current which is thought to be the most basic plan parameter for pervasive and portable processing frameworks.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信