{"title":"Characterization of skin lesions","authors":"K. Madhankumar, P. Kumar","doi":"10.1109/ICPRIME.2012.6208362","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208362","url":null,"abstract":"Malignant melanoma is the deadliest form among all skin cancers. Fortunately, if detected early, even malignant melanoma may be treated successfully. In this paper, a new intelligent method of classifying benign and malignant melanoma lesions is used. As the first step of the image analysis, preprocessing techniques are used to remove noise and undesired structures from the images using filter such as median filtering. Segmentation is one of the important steps in cancer automatic detection, because it can greatly affect on the results of detection. In the second step, a simple thresholding method is used to segment and localize the lesion, a boundary tracing algorithm is also implemented to validate the segmentation. In the third step, the different features are extracted from a segmented image and classified by using Stolz algorithm.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124010947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A high throughput sort free VLSI architecture for wireless applications","authors":"S. Soundharya, G. Prakash","doi":"10.1109/ICPRIME.2012.6208345","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208345","url":null,"abstract":"For high data rate Multiple Input Multiple Output technology is used in wireless communications. The use of multiple antennas at both transmitter and receiver (MIMO) significantly increases the capacity and spectral efficiency of wireless systems. This paper presents a Field Programmable Gate Array (FPGA) implementation for a 4 × 4 breadth first K-best MIMO decoder using a 64 Quadrature Amplitude Modulation (QAM) scheme. A novel sort free approach to path extension, as well as, quantized metrics result in a high throughput, low power and area. Finally, VLSI architectural tradeoffs are explored for a synthesized using synopsys the power analysis, throughput analysis in 120 nm technology. The power needed is 20.0025 μW.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121689527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis on the impact of fluoride in human health (dental) using clustering data mining technique","authors":"T. Balasubramanian, R. Umarani","doi":"10.1109/ICPRIME.2012.6208374","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208374","url":null,"abstract":"Data Mining is the process of extracting information from large data sets through using algorithms and Techniques drawn from the field of Statistics, Machine Learning and Data Base Management Systems. Traditional data analysis methods often involve manual work and interpretation of data which is slow, expensive and highly subjective Data Mining, popularly called as knowledge discovery in large data, enables firms and organizations to make calculated decisions by assembling, accumulating, analyzing and accessing corporate data. It uses variety of tools like query and reporting tools, analytical processing tools, and Decision Support System. [1][2] This article explores data mining techniques in health care. In particular, it discusses data mining and its application in areas where people are affected severely by using the under-ground drinking water which consist of high levels of fluoride in Krishnagiri District, Tamil Nadu State, India. This paper identifies the risk factors associated with the high level of fluoride content in water, using clustering algorithms and finds meaningful hidden patterns which give meaningful decision making to this socio-economic real world health hazard.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134563670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved security mechanism for high-throughput multicast routing in wireless mesh networks against Sybil attack","authors":"P. Anitha, G. Pavithra, P. S. Periasamy","doi":"10.1109/ICPRIME.2012.6208299","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208299","url":null,"abstract":"Wireless Mesh Networks (WMNs) have become one of the important domains in wireless communications. They comprise of a number of static wireless routers which form an access network for end users to IP-based services. Unlike conventional WLAN deployments, wireless mesh networks offer multihop routing, facilitating an easy and cost-effective deployment. In this paper, an efficient and secure multicast routing on such wireless mesh networks is concentrated. This paper identifies novel attacks against high throughput multicast protocols in wireless mesh networks through S-ODMRP protocol. Recently, Sybil attack is observed to be the most harmful attack in WMNs, where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to WMN. The Sybil attack is encountered by the defense mechanism called Random Key Predistribution technique (RKP). The performance of the proposed approach which integrates the S-ODMRP and RKP is evaluated using the throughput performance metric. It is observed from the experimental results that the proposed approach provides good security against Sybil attack with very high throughput.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134222888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of VLSI-oriented FELICS algorithm using Pseudo Dual-Port RAM","authors":"M. Rejusha, K. Jayanthi","doi":"10.1109/ICPRIME.2012.6208289","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208289","url":null,"abstract":"This paper presents a fast, efficient, lossless image compression algorithm named FELICS. This consists of two techniques named simplified adjusted binary code and GOLOMB-Rice code which provide lossless compression for high throughput applications. Two-level parallelism with four-stage pipelining is adopted. Pseudo Dual-Port RAM is used which improves the processing speed and decreases area and power consumption. The proposed architecture can be used for high definition display applications.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128205859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An augmented prerequisite concept relation map design to improve adaptivity in e-learning","authors":"R. Kavitha, A. Vijaya, D. Saraswathi","doi":"10.1109/ICPRIME.2012.6208279","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208279","url":null,"abstract":"Due to the advancement in information and communication technology and vast varied learner group, e-learning has become popular. For achieving the adaptivity in learning, predefined concept map is used to provide proper guidance. In most of the researches, weight of concepts in each learning item is not properly considered. In this study, a three phase prerequisite concept map formulation for adaptivity is proposed. This approach is a most efficient one, since the first phase discards all the unrelated items which may distract the further analysis. Here, Norm-referencing in Item Analysis approach is used to find the item discrimination for elimination of irrelevant items. The second phase, computes all the grade association rules. The weight of concept in each learning item is considered and prerequisite concept sets are found which is not having any redundancy and cyclic in its map, thereby facilitating the next step of procedure. The final phase constructs the concept map with maximum confidence in a capable manner. Finally, the Prerequisite concept map can be used in tutoring system, thereby enhancing the adaptivity in e-learning.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134014766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligence technique to solve combined economic and emission dispatch","authors":"R. Gopalakrishnan, A. Krishnan","doi":"10.1109/ICPRIME.2012.6208370","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208370","url":null,"abstract":"A power system operation at minimum cost is no longer the only measure for electrical power dispatch. Combined Economic Emission Dispatch (CEED) problem is attained by considering both the economy and emission objectives with necessary constraints. The stability of the power system is also considered as an important factor in the performance of the power system. Several optimization techniques are slow for such complex optimization tasks and are not suitable for on-line use. This paper presents an effective optimization algorithm, for solving security constrained combined economic emission dispatch problem. Also, the power system stability plays an important role in power system. Power system stability criteria are also considered in this paper for better performance of the entire power system. In this paper, an efficient optimization technique called Modified Artificial Bee Colony Optimization is used to solve the CEED problem. The performance of the proposed approach is compared with the other optimization techniques. The experimental result shows that the proposed system results in better solution for CEED problem with the maintenance of system stability.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"695 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115391024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new enhanced technique for link farm detection","authors":"D. Saraswathi, A. V. Kathiravan, R. Kavitha","doi":"10.1109/ICPRIME.2012.6208290","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208290","url":null,"abstract":"Search engine spam is a webpage that has been designed to artificially inflating its search engine ranking. Recently this search engine spam has been increased dramatically and creates problem to the search engine and the web surfer. It degrades the search engine's results, occupies more memory and consumes more time for creating indexes, and frustrates the user by giving irrelevant results. Search engines have tried many techniques to filter out these spam pages before they can appear on the query results page. Spammers intend to increase the PageRank of certain spam pages by creating a large number of links pointing to them. We have designed and develop a system, spamcity score that detects spam hosts or pages on the Web. The UK Web Spam UK 2007 data set has been used for experimentation. It is a public web spam dataset annotated at the level of hosts, for all results reported here. System uses the key features of popular link based algorithms to detect spam in improved manner. In this paper, various ways of creating spam pages, a collection of current methods that are being used to detect spam and a new approach to build a tool for improving link spam detection using spamcity score of term spam. This new approach uses SVMLight tool to detect the link spam which considers the link structure of Web and page contents. These statistical features are used to build a classifier that is tested over a large collection of Web link spam. The link farm can be identifying based on Web Graph, classification by using SVMLight Tool, Degree based measure, page Rank, Trust Rank, and Truncated PageRank. The spam classifier makes use of the Wordnet word database and SVMLight tool to classify web links as either spam or not spam. These features are not only related to quantitative data extracted from the Web pages, but also to qualitative properties, mainly of the page links.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128775381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Double encryption based secure fuzzy vault construction using fingerprint biometric features","authors":"R. Narayanan, S. Karthikeyan","doi":"10.1109/ICPRIME.2012.6208339","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208339","url":null,"abstract":"Security has become one of the major concerns in the present scenario because of the increase in quantity of data and theft. Due to these reasons, an efficient security system is very much necessary for protecting the authorized properties. This leads to the usage of password, key, etc., for securing the system. This security system can be easily broken because the password and key can be easily lost by the user. Also, the users have to memorize the password and key for access to the system and sometimes the user may forget the password and key. This has forced the researchers for developing a better security system. Then, the usage of biometrics evolved to be better technique for security purpose as biometrics is unique for every individual. Mostly used biometrics features for security purpose are fingerprint, iris, retina, palm, face, etc. This paper focuses on using the fingerprint as biometrics for developing a security system. The security is enhanced in this paper by using double encryption technique by means of combining symmetric key and a symmetric key generation. Also, Reed and Solomon codes are used to provide tolerance for decryption. The experimental result shows that the proposed Fuzzy Vault construction results in proving better security.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125322559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of employees of an organization using formal concept analysis","authors":"C. Aswani Kumar, K. Sumangali","doi":"10.1109/ICPRIME.2012.6208293","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208293","url":null,"abstract":"FCA is a mathematical framework that depicts knowledge derived from the data represented as formal context. The objective of this paper is to apply Formal Concept Analysis (FCA) to analyze the key performance areas (KPA) of faculty of an institute. While constructing the formal context we have considered the faculties as objects and their KPA as attributes. This context is processed using FCA and the knowledge derived is analyzed to measure the performance of the faculty.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}