{"title":"Medical image segmentation using multi resolution histogram","authors":"T. Ganga, V. Karthikeyani","doi":"10.1109/ICECTECH.2011.5942095","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942095","url":null,"abstract":"An efficient algorithm for Multi resolution medical image segmentation is presented. The main objective of medical image segmentation is to extract the anatomic structures and its characteristics with respect to some input features. There exists various methodologies for medical image segmentation but struggles with missing features due to the noise presence in the medical images. We propose a new technique to increase the resolution of the medical images to identify the features and edges of the medical images. We use multi-class Histogram based segmentation method to preserve the edges and increase the resolution of the medical images. With the proposed technique the memory and time consumption is hugely reduced, which is an important factor in the medical field and produces good results.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129886349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An online recommendation system based on web usage mining and Semantic Web using LCS Algorithm","authors":"Y. S. Sneha, G. Mahadevan, M. Prakash","doi":"10.1109/ICECTECH.2011.5941689","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941689","url":null,"abstract":"E commerce has changed the entire look of the world's trading business. Nowadays more and more people are willing to do B2B transactions over the internet. Semantic Web Mining aims at combining the two fast-developing research areas. Web users exhibit a variety of navigational interests through clicking a sequence of web pages. WUM is used for mining the user logs for understanding user interest and generating interesting patterns. Online recommendation and prediction is one of the web usage mining applications. The semantic information of the Web page contents is generally not included in Web. The idea is to improve the results of Recommender system and to overcome the new item problem by exploiting the new semantic structures in the Web. In this paper we present architecture for integrating semantic information about the products with web log data and generate a list of recommended products by using LCS Algorithm. The implementation shows good performance in terms of precision, recall and F1 metrics.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130371145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Shankar, A. Vijay, Aroba Sahaya Ligesh, Ashok Kumar, M. Anburajan
{"title":"Comparison of Singh's index with Dual energy x-ray absorptiometry (DXA) in evaluating post-menopausal osteoporosis","authors":"N. Shankar, A. Vijay, Aroba Sahaya Ligesh, Ashok Kumar, M. Anburajan","doi":"10.1109/ICECTECH.2011.5941772","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941772","url":null,"abstract":"Osteoporosis is a thinning of the bone that leads to fracture with minimum force. It affects postmenopausal women and elderly of both genders. Bone mineral density (BMD) is one of the parameter related to bone strength. Dual energy x-ray absorptiometry (DXA) is currently considered as the \"gold standard\" for measuring BMD. In India, DXA is very few in number and it is costly; on the other hand plain radiograph is cheaper and it is commonly taken even at rural health centre. The Sing's index (SI) is an inexpensive simple method to evaluate trabecular micro-architecture of the proximal femur, commonly used to assess osteoporosis. It is based on the radiological appearance of the trabecular bone structure of the proximal femur on a digital antero-posterior (AP) radiograph. A free medical camp for osteoporosis was conducted at SRM Medical College and Research Institute, Kattankulathur, Tamil Nadu, India during the months of June to August, 2010. 50 Indian women, aged 20–84 years were recruited. Out of which, 11 were pre-menopausal women, and the remaining 39 were post-menopausal women. BMD of the right proximal femur was measured in all women using a DXA, the total body bone densitometer. Also, digital radiograph of the right proximal femur was obtained in all the women WHO's diagnostic criteria for the disease was used in the study; Based on the femur neck DXA-BMD values, post-menopausal women were divided into the following subgroups: i) normal; ii) osteopenia; and iii) osteoporosis. The digital hip x-ray was visually assessed by an experienced radiologist and subsequently SI grading was done. All data was calculated as mean ± SD. Data analysis was carried out using SPSS/PC statistical software package. Student's t-test was used to find out the significance of the variables between the two groups. Pearson correlations were measured between the variables. In all post-menopausal women (n=39), the SI grading was correlated with total BMD by DXA, and it was statically significant (r2=0.168, p=0.05). In osteoporotic women, the mean values of femur neck BMD and SI were lesser by 33.7% and 30.0% respectively than in normal post-menopausal women, and these decrease were statistically significant (p=0.05). From this, it was found that, the percentage decrease was similar for both femur neck BMD measured by DXA and SI by simple visual assessment in osteoporotic women. SI can be used as a screening tool for the disease, particularly developing countries like India.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130379268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Economical job scheduling in wireless grid","authors":"M. N. Birje, S. Manvi, Chetan M. Bulla","doi":"10.1109/ICECTECH.2011.5941835","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941835","url":null,"abstract":"Wireless grid can be seen as a market place where consumers would like to execute their jobs and resource providers would like to provide the resources to consumers based on some cost. The status of resources (like CPU, memory) is affected by the factors such as the number of jobs submitted to it, the number of jobs executing, battery power etc. This paper proposes a cost effective job scheduling mechanism based on system state. It considers the dynamically changing resource status, predicts the resource state, estimates the job cost and schedules the job to optimal resources. We simulated different test cases using load traces sampled from Pentium machine during particular time. Our simulation results demonstrate that the proposed job scheduling method is cost effective and reduces the job rejection ratio.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130550145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for cross language information retrieval","authors":"B. Manikandan, R. Shriram","doi":"10.1109/ICECTECH.2011.5942045","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942045","url":null,"abstract":"Cross-language information retrieval (CLIR) is a subfield of information retrieval dealing with retrieving information written in a language different from the language of the user's query. The domain of CLIR is crucial in the future as vast amount of content in the web is in English. There is a need for mechanisms that can retrieve the content from English and translate it to the native language. This paper proposes a text summarization-suffix tree algorithm for the overall process of CLIR. The idea is to summarize the content and re-rank the results based on clustered coefficients. This method can improve the efficiency of the content retrieved and afford a great flexibility to the user. The key contributions of this paper are to explain the approach and discuss the key results.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126881066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Al-Masood, M. Sahadat, S. R. Deeba, S. Ahmad, G. Biswas, A. Elahi, N. M. Zakaria
{"title":"Reliability evaluation of Bangladesh Power System using cumulant method","authors":"N. Al-Masood, M. Sahadat, S. R. Deeba, S. Ahmad, G. Biswas, A. Elahi, N. M. Zakaria","doi":"10.1109/ICECTECH.2011.5941669","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941669","url":null,"abstract":"In recent years, power systems are frequently operating under highly stressed and unpredictable conditions because of not only the market-oriented reform of power systems but also the integration of various renewable energy sources. The uncertain factors resulting from the market constraints and the inherent randomness of renewable energy set higher requirements on the reliability of electric networks. This paper presents the reliability assessment of Bangladesh Power System (BPS). Reliability index, loss of load probability (LOLP) of BPS is evaluated using cumulant method. The rationale for using the cumulant method is to take advantage of its computational efficiency. BPS has sixty one generators and a total installed capacity of 5275 MW. The maximum demand of BPS is about 5000 MW. The relevant data of the generators and hourly load profiles are collected from the National Load Dispatch Center (NLDC) of Bangladesh and reliability index ‘LOLP’ is assessed. The simulation results show that the LOLP of BPS is 2.06%.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126991283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Madhukar Rao, M. Nadeem Baig, Md. Fareed Baba, K. Kanthi Kumar
{"title":"Energy efficient reliable routing protocol for mobile ad hoc networks","authors":"G. Madhukar Rao, M. Nadeem Baig, Md. Fareed Baba, K. Kanthi Kumar","doi":"10.1109/ICECTECH.2011.5942006","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942006","url":null,"abstract":"An important issue for mobile ad hoc network is the routing protocol design. Due to frequent changes in the topology of the network this becomes a major technical challenge. Node failures and link breakages in the network may cause loss of the network resources. Our proposed scheme enhances the QoS parameters like network stability, efficient packet delivery ratio and network lifetime which thereby improves the reliability of the network. This routing scheme is based on backbone nodes in the network and is incorporated in the AODV protocol. It combines stable routes, battery power and signal strength of the nodes to achieve the QoS parameters.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127042450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A model driven approach for design and development of a safety critical system","authors":"Nisha G R","doi":"10.1109/ICECTECH.2011.5941847","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941847","url":null,"abstract":"Faults in safety critical systems are the important elements to be avoided. To avoid these errors or faults, Fault Tolerant (FT) systems are evolved. But still, some more hidden design faults are not weeded out before realization by traditional and life cycle tests and analysis. In this paper, an approach has been described to find out these types of faults by simulating system architecture with modeling and simulation. By this model based methods, one can enable early verification of the system and quickly find errors or faults and deal with it. This is a very attractive approach, since the systems are critical systems, in which a pre condition that applies to those systems to evaluate or analyze. By doing so, one can test and analyze their system even before hardware as well as software realization [1]. Also, nowadays, the cost of developing a critical system increases exponentially when system design errors are found after the implementation or integration of the system. In this paper, a model driven approach is described for design and development of a safety critical system. The stated approach is described along with functional description of electrical system architecture and the concept of modeling. Self-Checking-Pair (SCP) based computer architecture with high speed communication bus interface is modeled and the performance is evaluated before its hardware and software realization [2].","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123811024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Throughput analysis of IEEE 802.11e EDCA under non saturation condition","authors":"G. Prakash, P. Thangaraj","doi":"10.1109/ICECTECH.2011.5942063","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942063","url":null,"abstract":"The IEEE 802.11e WLAN defines a MAC Protocol to support real-time application. In this paper, we propose an analytical model for performance evaluation of IEEE 802.11e EDCA scheme under non-saturation condition and channel error rate. The analytical model is suitable for both basic access and RTS/CTS access mechanisms. We develop an expression for the nonsaturation throughput as a function of the number of stations, packet sizes and BER. We validate the accuracy of our analysis with simulation expression. Using this model, the contention factors can be arranged appropriately to accomplish specific quality-of-service (QoS) requirements.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-colored line following and obstacle avoiding helicopter","authors":"S. Divakar","doi":"10.1109/ICECTECH.2011.5941873","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941873","url":null,"abstract":"This paper presents a way to build a Multi-colored line following and obstacle avoiding helicopter using 4 infrared sensors. This helicopter is built on an ATmega8 microcontroller which has been programmed using Arduino. It has 1 infra-red sensor (LM358) below it in-between the landing gears, one infra red sensor to its left, one to its right and one at front to detect obstacles. It has 3 DC motors, two at the top and one at the rear. There are 2 H-bridges (L293D) mounted on it to provide the driving mechanisms for the motors. Three DC motors with rated voltage of 3.7V are used. Once the helicopter has been turned on, it rises about 5cms above the ground and goes straight and left until a line has been detected by the sensor. It then starts going straight right until the sensor stops encountering the line. If at all at any point of time any of the sensors detect an obstacle it will stop until the obstacle has been removed. It continues doing this until there is no line to follow in which case it continues going in a straight and left way or it has been brought to rest by switching it off.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123944568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}