2018 IEEE Punecon最新文献

筛选
英文 中文
NXTGeUH: LoRaWAN based NEXT Generation Ubiquitous Healthcare System for Vital Signs Monitoring & Falls Detection NXTGeUH:基于LoRaWAN的下一代泛在医疗系统,用于生命体征监测和跌倒检测
2018 IEEE Punecon Pub Date : 2018-11-01 DOI: 10.1109/PUNECON.2018.8745431
Warish D. Patel, Sharnil Pandya, Baki Koyuncu, Bhupendra Ramani, S. Bhaskar, H. Ghayvat
{"title":"NXTGeUH: LoRaWAN based NEXT Generation Ubiquitous Healthcare System for Vital Signs Monitoring & Falls Detection","authors":"Warish D. Patel, Sharnil Pandya, Baki Koyuncu, Bhupendra Ramani, S. Bhaskar, H. Ghayvat","doi":"10.1109/PUNECON.2018.8745431","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745431","url":null,"abstract":"The challenge for deployment of low-cost and high-speed ubiquitous Smart Health services has prompted us to propose new framework design for providing excellent healthcare to humankind. So, there exists a very high demand for developing an Internet of Medical Things (IoMT) based Ubiquitous Real-Time LoRa (Long Range) Healthcare System using Convolutional Neural Networks (CNN) to agree if a sequence of frames contains a person falling. To model the video motion and make the system scenario sovereign, in this research, we use optical flow images as input to the networks. Right now hospital and home falls are a noteworthy medical services concern overall on account of the aging populace. Current observational information, vital signs and falls history give the necessary data identified with the patient's physiology, and movement information give an additional utensil in falls risk evaluation. The proposed framework utilizes Real-Time Vital signs monitoring and emergency alert message to caregivers or doctors. In this context, we introduce \"LoRaWAN based Next Generation Ubiquitous Healthcare System (NXTGeUH), an intelligent middleware platform. In addition, this proposed method is evaluated with different public hospital datasets achieving the state-of-the-art outcomes in all aspects.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124139163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Text Detection from Scene Videos having Blurriness and Text of Different Sizes 具有模糊和不同大小文本的场景视频文本检测
2018 IEEE Punecon Pub Date : 2018-11-01 DOI: 10.1109/PUNECON.2018.8745375
M. Mehta, S. A. Pote
{"title":"Text Detection from Scene Videos having Blurriness and Text of Different Sizes","authors":"M. Mehta, S. A. Pote","doi":"10.1109/PUNECON.2018.8745375","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745375","url":null,"abstract":"Text in videos needs to be detected correctly as it contains important information related to natural scene in videos. Text detection is useful for automatic number plate recognition, street boards reading, Optical Character Recognition (OCR), automatic document scanning and to help blind or visually impaired people. The existing scene text detection techniques are unable to detect text accurately from the videos having low contrast, complex background or excessively small fonts. Hence, we propose a new text detection technique that enhances accuracy of detecting text and reduceses average processing time. Our text detection technique incorporates Edge-enhanced Maximally Stable Extremal Regions (eMSER) method to preserve shape of characters and modified fuzzy C-means clustering to converge faster. In this paper, we provide an experimental analysis of our improved text detection technique. To show the effectiveness of our proposed text detection technique, we have performed experiments considering videos having text of different sizes as well as considering blur videos. The experimental results show that an improved text detection technique outperforms an eMSER based text detection technique.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127605328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Answer Selection In Community Question Answering Portals 社区问答门户中的答案选择
2018 IEEE Punecon Pub Date : 2018-11-01 DOI: 10.1109/PUNECON.2018.8745429
Juee Gosavi, B. N. Jagdale
{"title":"Answer Selection In Community Question Answering Portals","authors":"Juee Gosavi, B. N. Jagdale","doi":"10.1109/PUNECON.2018.8745429","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745429","url":null,"abstract":"New level of information sharing is enabled by different online communities like wikis, blogs, forums etc. which provides a platform for interaction with individuals which offers services like searching and posting queries or answers and share expertise with other information seekers. For recently posted query or searched query system furnishes the pool of answers with similar questions links, which could be a prolonged task for finding the significant answer. To overcome this, the system proposes an approach to effectively rank answers which are most relevant and best from historical archives based on similar queries found. It comprises of two components, one which contains training samples with positive, negative and neutral classes and other component retrieves similar questions to posted questions which are with their answer pools. Two data mining approaches were compared to retrieve similar questions. Our objective is to rank answer candidates based on pair wise comparison where question-answer pairs are ranked using pair wise learning to a rank approach based on a trained model which provides the user with most relevant answers for a given posted question.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133982411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study of Two-Phase Unsteady Model of Blood Flow in a Tapered Stenosed Artery in the Presence of Externally Applied Transverse Magnetic Field 外加横向磁场作用下锥形狭窄动脉血流两相非定常模型的研究
2018 IEEE Punecon Pub Date : 2018-11-01 DOI: 10.1109/PUNECON.2018.8745439
V. Sreenivasa, Arundhati Suresh Warke
{"title":"Study of Two-Phase Unsteady Model of Blood Flow in a Tapered Stenosed Artery in the Presence of Externally Applied Transverse Magnetic Field","authors":"V. Sreenivasa, Arundhati Suresh Warke","doi":"10.1109/PUNECON.2018.8745439","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745439","url":null,"abstract":"Transverse magnetic field is applied externally on a tapered stenosed artery by considering blood flow as two-flow model, Newtonian in peripheral region and nonNewtonian in core region. The pulsatile flow of blood in peripheral region is considered as Bingham Plastic model and the flow in core region is considered as Herschel-Bulkley model. Dimensionless mathematical model (system of non linear differential equations) is formulated and solved using one of the most advantageous methods, finite difference method. The expressions for important flow characteristics axial velocity, volumetric flow rate and wall shear stress are derived to analyze the effect of magnetic field, tapering angle, hematocrit and time component. Matlab 7.10.0 is used for mathematical simulation. It is found that all the flow characteristics are affected in stenosed artery and magnetic field helps to regulate the flow up to some extent.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122923626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Novel Fingerprint Liveness Detection with Fractional Energy of Cosine Transformed Fingerprint Images and Machine Learning Classifiers 基于余弦变换指纹图像分数能量的指纹活力检测与机器学习分类器
2018 IEEE Punecon Pub Date : 2018-11-01 DOI: 10.1109/PUNECON.2018.8745407
Smita Khade, Sudeep D. Thepade
{"title":"Novel Fingerprint Liveness Detection with Fractional Energy of Cosine Transformed Fingerprint Images and Machine Learning Classifiers","authors":"Smita Khade, Sudeep D. Thepade","doi":"10.1109/PUNECON.2018.8745407","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745407","url":null,"abstract":"Biometric identification has gained more popularity and trust because of the ease of accessibility and unique person identification. Fingerprints are most widely used and studied in biometric identification. These days impersonation of fingerprints by means of gelatin, wood glue , cadaver are posing new challenges for fingerprint based biometric identification system. Hence fingerprint liveness detection has become one of the primitive and essential research areas .Machine learning classifiers may help in fingerprint liveness detection with the help of properly extracted features of fingerprints. The orthogonal transforms may support proper extraction of features because of energy compaction capability, for swifter and more accurate fingerprint liveness detection with fractional coefficients considered as feature vectors .The paper propose novel fingerprints liveness detection techniques with fractional coefficients of cosine transformed fingerprints samples and machine learning classifiers .Experimentation is carried out with eight propositions of fractional coefficients of Cosine transformed fingerprints considered to form feature vectors with four assorted machine learning classifiers and tested on 2 benchmark datasets ATVS and FVC 2000 .The classification accuracy is used to compare the performances of the variations of proposed fingerprint liveness detection method .Overall better liveness detection is observed with 0.094%of fractional coefficients for random forest classifiers closely followed of 0.094 fractional coefficients .The feature level fusion of 0.094% and 0.024% of fractional coefficients has given further boost in accuracy of fingerprint liveness detection.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121374167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
CReP: A Packet Forwarding Protocol in Mobile Social Networks 移动社交网络中的数据包转发协议
2018 IEEE Punecon Pub Date : 2018-11-01 DOI: 10.1109/PUNECON.2018.8745368
N. Kapade
{"title":"CReP: A Packet Forwarding Protocol in Mobile Social Networks","authors":"N. Kapade","doi":"10.1109/PUNECON.2018.8745368","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745368","url":null,"abstract":"In the era computing, without the knowledge of the whole network and absence of end-to-end paths, packet forwarding has gained crucial importance in autonomous mobile social networks (MSNs). A mobile social network provides a platform to collect users' mobility information via mobile devices and encourages many location-aware services. MSNs allow users to discover and share content with each other. This content can be like exhibitions or conference information. In this paper, we proposed Credit with Reputation and Punishment based (CReP) packet forwarding protocol in MSNs to reduce delivery overhead and to increase packet delivery ratio. The analytic analysis shows that CReP protocol achieves the best strategy to forward packet among mixed cooperative and selfish devices. Further, extensive simulation results show that CReP protocol offers much better performance, regarding delivery overhead and delivery ratio than the selfish epidemic, incentive forwarding, and ICMP protocol.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115974648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lossless Image Compression Using Seed Number and JPEG-LS Prediction Technique 基于种子数和JPEG-LS预测技术的无损图像压缩
2018 IEEE Punecon Pub Date : 2018-11-01 DOI: 10.1109/PUNECON.2018.8745436
Roopa P. Huilgol, V. Baligar, T. Patil
{"title":"Lossless Image Compression Using Seed Number and JPEG-LS Prediction Technique","authors":"Roopa P. Huilgol, V. Baligar, T. Patil","doi":"10.1109/PUNECON.2018.8745436","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745436","url":null,"abstract":"This paper presents a new lossless image compression algorithm which uses Joint Photographic Expert Group-Lossless (JPEG-LS) prediction technique and the concept of the seed number for compression. Image is processed in blocks of size 4*4. Pixels of the blocks are placed in a table of size 16*16. The span across which the pixels of each block are spread in the table is determined which forms a rectangle. Seed number for that block is computed. Using the JPEG-LS prediction technique in regular mode, the pixels are predicted and their position in the rectangle is found. Huffman encoded seed number, rectangle position and the positions of the pixels constitute the compressed files. Image is decompressed by Huffman decoding the files and reconstructing the pixels with the help of the pixel position, rectangle position and the seed number. This approach gives a new technique to compress the image, It is a simple approach and though the compression ratio is slightly lesser compared to JPEG-LS, it can be improved by Iterative approach.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115173324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Vehicle Safety Monitoring System Using CAN Protocol 基于CAN协议的智能车辆安全监控系统
2018 IEEE Punecon Pub Date : 2018-11-01 DOI: 10.1109/PUNECON.2018.8745426
Rachana Khamamkar, A. Jadhav, Shreyas Thoke, Girish Chaple
{"title":"Smart Vehicle Safety Monitoring System Using CAN Protocol","authors":"Rachana Khamamkar, A. Jadhav, Shreyas Thoke, Girish Chaple","doi":"10.1109/PUNECON.2018.8745426","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745426","url":null,"abstract":"In this contemporary era, automobiles have become an integral part of one’s life. The repercussions of which demand automobiles with enhanced security systems in order to indemnify against lethal fiascos. The presented work thus cites a system predicated on Controller Area Network (CAN) protocol, a communication protocol which extends an efficient and real-time solution for the transfer of information amongst nodes, harnessed to preclude failures in vehicles and assist the driver by providing apposite indications and messages.The system is a three node network comprising of an 8-bit, Master Synchronous Serial Port (MSSP) module supporting 3-wire SPI (all 4 modes) slave controllers (PIC18F4550) which forms a data acquisition system and the CAN bus facilitates efficient transfer of this acquired data to the 32-bit, SPI compliant master controller (ARM7 LPC2148). In order to interface these controllers to the CAN bus, these controllers require external CAN controllers (MCP2515) and CAN transceivers (MCP2551). The main objective of fabricating such a system being interchangeability of node controllers keeping the CAN bus network unperturbed. Also, one of the major advantages of establishing CAN communication is that it is resilient to electrical noise.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125978434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Matrix for Location Categorization In Human Mobility Mining 人类流动性挖掘中一种新的位置分类矩阵
2018 IEEE Punecon Pub Date : 2018-11-01 DOI: 10.1109/PUNECON.2018.8745402
Chetashri Bhadane, K. Shah
{"title":"A Novel Matrix for Location Categorization In Human Mobility Mining","authors":"Chetashri Bhadane, K. Shah","doi":"10.1109/PUNECON.2018.8745402","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745402","url":null,"abstract":"Human mobility mining is feasible due to easy availability of the users’ GPS traces. User’s trajectory derived from GPS based track points is the raw data for mining various trends in user mobility. Identification of staypoints and region of interest (RoI) is one of the most important aspects while processing trajectory data for the various location-based application. Staypoints and RoIs are the locations where the user spends some measurable time and performs some activity. These are the important locations of the user’s daily routine and probably interesting locations from the user’s perspective. Each location possesses substantial importance in user’s routine. One of the basic methods to find such locations is to analyze user’s mobility traces to find staypoints from it and then to perform clustering on these staypoints. Existing algorithms gives equal importance to all such identified locations while designing mobility-based applications. However, realistically, all locations cannot have the same importance from the user’s perspective. Also, there are chances to find few locations like home or work almost in each mobility trace even after keeping less time granularity. So, we have proposed a novel location categorization matrix LoCMat to classify location as per their importance in the user’s routine based on frequency and duration of visits to each location. Identifying, retaining and assigning appropriate weightage to all such locations will enhance results of mobility mining. We have tested our proposed matrix with real dataset \"Mobi-India\". Our method identifies meaningful locations, assigns weightage to each one of them which can be used further for mobility mining.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131883419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT Solution For Live Wire Tampering 用于带电篡改的物联网解决方案
2018 IEEE Punecon Pub Date : 2018-11-01 DOI: 10.1109/PUNECON.2018.8745414
Akshaya U Kulkarni, Jayalaxmi G.N
{"title":"IoT Solution For Live Wire Tampering","authors":"Akshaya U Kulkarni, Jayalaxmi G.N","doi":"10.1109/PUNECON.2018.8745414","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745414","url":null,"abstract":"Internet of Things (IoT) is making next transformation within the world of web. It provides intelligent amenities to the society. India is also not lagging behind to make use of IoT technology and because of this more cities are becoming smart in the country. Even though, 70% population in Indian towns is facing many challenges like garbage management, electricity and water supply. Electricity board in the township has many issues to provide the service at the expected level. One of the major issues is related to electricity losses which are of two types, technical and non-technical losses. Technical losses happen due to properties of materials utilized in transmission and dispersion system. Non-technical losses are electricity theft which includes tampering meters, unpaid bills, electric line tampering. Majority of the meter tampering issues have been resolved by taking smart meters into the picture but the line tampering issue still persists. The steps to solve line tampering problems include placing smart meters by removing lines which is exorbitant and time consuming. Thus, the paper provides unadorned and efficient way to solve the problem by IoT to detect the amount of electricity theft. There is provision for automatic cut of power using Arduino Uno and Raspberry Pi3 when lines are connected in parallel, the electricity received is more than provided. Theft location is reported to the admin via sms using SIM808 module. These things are monitored and managed by admin from remote place on the application to save the investigation time, energy, cost in a most efficient way possible. The results obtained are the comparisons between current v/s time with and without tampering. Also, the cost recurred when tampering is avoided.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131799206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信