{"title":"Comparison of neural network back propagation algorithms for early detection of sleep disorders","authors":"V. Garg, R. Bansal","doi":"10.1109/ICACEA.2015.7164648","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164648","url":null,"abstract":"Sleep is not merely a BREAK from our regular work. It is must to be physically and mentally refreshed every day. Having a sound nights sleep, one can perform best in whatever job in hand. But some time, sleep gets disturbed along with some awkward behaviors known as sleep disorders. The various techniques and practices are followed by numerous researchers for the diagnosis of the unusual behaviors which increase the disturbances in sleep and also encourage other sleep disorders. In this paper, a step has been taken towards the early detection of a few sleep disorders like Sleep Apnea, Insomnia, Parasomnia and Snoring using artificial neural network algorithms. The prior detection of these disorders can reduce the further effects on human body. This paper presents the comparison of four training algorithms gradient descent, quasi newton, conjugate gradient and Bayesian regularization by using different training functions such as trainrp, trainlm, trainscg and trainbr respectively. All these algorithms are trained by the data set acquired from various physicians. From the results, it is found that Bayesian regularization algorithm which is trained by using trainbr training function provides the best result for early detection of sleep disorders as per chosen sample size of 95 patient records.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114551011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on defect and noise detection and correction algorithms in image sensors","authors":"Abhishek Jain, Richa Gupta","doi":"10.1109/ICACEA.2015.7164803","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164803","url":null,"abstract":"This paper presents a survey on various novel defect and noise detection and correction algorithms used in CMOS image sensors. This class of sensors is extremely relevant in number of applications in the areas of gaming, security, medical, automotive, high-end camera market, etc. This survey outlines the algorithms and the hardware implementation of novel defect and noise detection and correction schemes to detect and correct defective pixels, and discusses their performance and advantages in terms of their applications. Experimental results on various images illustrate the capabilities of the studied approaches.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128324718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast scale invariant multi-view face detection from color images using skin color segmentation & trained cascaded face detectors","authors":"Ashish Gor, Malay S. Bhatt","doi":"10.1109/ICACEA.2015.7164779","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164779","url":null,"abstract":"Face detection is important step in face recognition, expression analysis, security, surveillance which has challenges due to multiple scales, views, rotations of faces & false background objects. Skin color segmentation, connected component extraction & correlation analysis on image is done to reduce search space & to improve detection rate. Cascaded face detectors are trained using Viola & Jone's Adaboost based Machine learning algorithm for each possible range of views & possible rotations. Segmented regions of 16*16 sizes are given to Cascaded face detectors to verify the presence of face. Experimental results show that it has very good detection rate for frontal & remarkable rate non-frontal, multi-view faces with negligible time duration in poor background/weather/lighting conditions.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129080261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified approximate lower triangular encoding of LDPC codes","authors":"Arijit Dutta, A. Pramanik","doi":"10.1109/ICACEA.2015.7164731","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164731","url":null,"abstract":"LDPC codes have become the most popular error control code in various fields like telecommunication, magnetic recording etc. due to their high error correcting capability. The Approximate Lower Triangular (ALT) encoding is the most commonly used encoding technique of LDPC codes. This technique though elegant suffers from the shortcoming that when a particular sub matrix of the H matrix obtained after ALT encoding is singular, the technique fails. In this paper a new algorithm is proposed to handle this shortcoming. In this work a new algorithm is proposed to bring any rectangular sparse LDPC matrix into a rectangular part and a square upper triangular part. This algorithm is implemented to encode a general H matrix. This algorithm is further appended to the ALT format of LDPC encoding and another efficient encoding technique is proposed for LDPC code. Both the proposed techniques have a pre-processing step followed by the actual encoding step. Scatter plots of the H matrices (after preprocessing) are shown. BER performance of the new Modified ALT technique is compared with the existing Systematic Approximate Lower Triangular method. The proposed algorithm gives better BER performance.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121312952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Goyal, Amit K. Agarwal, Tanya Kukreja, N. Khanna
{"title":"Narrowing awareness gap by using e-learning tools for counselling university entrants","authors":"P. Goyal, Amit K. Agarwal, Tanya Kukreja, N. Khanna","doi":"10.1109/ICACEA.2015.7164822","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164822","url":null,"abstract":"Higher Education is very crucial factor for the growth and development of individuals, and this contributes significantly to social, economic and scientific development of the country. Making an admission decision for higher education is a very challenging and critical for a student's success, especially with the rapid increase in number of different options available. A questionnaire survey of more than 400 engineering college entrants in India, was conducted at the time of their counselling. The survey reveals that there is a need for counselling the entering students to help them better evaluate the different universities that they are considering for their under-graduate admissions, and making the students more aware of the different ranking parameters that are also used by several popular university ranking systems, nationally and internationally. We also discuss how the existing awareness gap can be narrowed using appropriate E-learning tools in order to improve the qualitative and quantitative variety of the learning environment as a whole.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121333021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deployment of secure sharing: Authenticity and authorization using cryptography in cloud environment","authors":"Akanksha Upadhyaya, Monika Bansal","doi":"10.1109/ICACEA.2015.7164823","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164823","url":null,"abstract":"Cloud computing is a cost-effective, scalable and flexible model of providing network services to a range of users including individual and business over the Internet. It has brought the revolution in the era of traditional method of storing and sharing of resources. It provides a variety of benefits to its users such as effective and efficient use of dynamically allocated shared resources, economics of scale, availability of resources etc. On the other part, cloud computing presents level of security risks because essential services are often controlled and handled by third party which makes it difficult to maintain data security and privacy and support data and service availability. Since cloud is a collection of machines called servers and all users' data stored on these machines, it emerges the security issues of confidentiality, integrity and availability. Authentication and authorization for data access on cloud is more than a necessity. Our work attempts to overcome these security challenges. The proposed methodology provides more control of owner on the data stored on cloud by restricting the access to specific user for specific file with limited privileges and for limited time period on the basis of secret key using symmetric as well as asymmetric mechanism. The integrity and confidentiality of data is ensured doubly by not only encrypting the secret key but also to the access permission and limited file information.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124299890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A priority based job scheduling algorithm using IBA and EASY algorithm for cloud metaschedular","authors":"Kalka Dubey, Mohit Kumar, M. Chandra","doi":"10.1109/ICACEA.2015.7164647","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164647","url":null,"abstract":"Job scheduling (JS) is one of the most important issues in a Cloud system. The objective of job schedulers in cloud computing is to meet users' requirements and optimize the utilization of cloud resources. To achieve better QoS with high resource utilization in a cloud environment, an improved backfill algorithm (IBA) using balanced spiral (BS) method can be used. Results show that IBA minimizes resource idleness up to a great extent. However, IBA does not provide support for handling job priority and QoS. We need an algorithm to maximize the resource utilization while considering priority.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124334259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web application for analysis of CSS styling issues and Gurmukhi fonts for Punjabi website","authors":"S. Singal","doi":"10.1109/ICACEA.2015.7164740","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164740","url":null,"abstract":"There are many CSS styling issues in the display of regional languages. This paper describes the CSS styling issues for Punjabi language. A number of Punjabi websites have been analyzed to find out the CSS styling issues. The websites use Unicode and non-Unicode Gurmukhi fonts to write the content in Punjabi. But, the non-Unicode Gurmukhi fonts may not be compatible with the user's system. The analysis for the same is also presented in this paper. To find out more related problems, a web application has been designed using which the end user can apply the CSS styles to his/her own Punjabi text. The effect of applying the CSS styles may vary for different operating systems as well as for different web browsers. The issues reported by the end user will be saved in a database for analysis.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126429753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of CMRS rock mass rating using fuzzy logic","authors":"Devanand, Naveen Kumar","doi":"10.1109/ICACEA.2015.7164685","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164685","url":null,"abstract":"CMRS (Central Mining Research Station) Geomechanical rating of rock mass is a classification system based on the various parameters which was defined by CMRS. The rating system may possess some fuzziness in its practical applications. For example, groundwater seepage and weatherability (measured by I Cycle slake durability) are related by experts in linguistic terms with approximation. Descriptive terms vary from one expert to another, while in the RMR system values which are related to these terms are probably the same. On the other hand, sharp transitions between two classes create uncertainties. So it is proposed to determine new weight interval for these parameters. Fuzzy model based on the Mamdani algorithm was introduced to evaluate proposed weights, so that the linguistic approximation based problem could be solved. Further, experiments are done with some of coal mines areas where this fuzzy based rock mass rating gives more satisfactory result than the existing CMRS rating techniques.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131384460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of feature extraction techniques for hyperspectral image classification","authors":"Diwaker, M. Dutta","doi":"10.1109/ICACEA.2015.7164795","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164795","url":null,"abstract":"Using image classification methods to produce thematic maps from hyperspectral data is a challenging image processing task. Feature extraction is an important preprocessing operation to reduce the dimensionality of hyperspectral while preserving most of the information. This research work investigates some of the widely used feature extraction techniques and provides and accuracy analysis by performing experiments on a real dataset. A comparative performance analysis of some of the most important techniques including principle component analysis (PCA), Decision Boundary Feature Extraction (DBFE), and discriminative analysis feature extraction (DAFE) is provided in this work. The classification is carried out using statistical and neural network classifiers. The experimental results shown that DBFE has yielded best accuracy classification among the investigated techniques.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134106434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}