2015 International Conference on Advances in Computer Engineering and Applications最新文献

筛选
英文 中文
Comparison of neural network back propagation algorithms for early detection of sleep disorders 神经网络反向传播算法在睡眠障碍早期检测中的比较
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164648
V. Garg, R. Bansal
{"title":"Comparison of neural network back propagation algorithms for early detection of sleep disorders","authors":"V. Garg, R. Bansal","doi":"10.1109/ICACEA.2015.7164648","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164648","url":null,"abstract":"Sleep is not merely a BREAK from our regular work. It is must to be physically and mentally refreshed every day. Having a sound nights sleep, one can perform best in whatever job in hand. But some time, sleep gets disturbed along with some awkward behaviors known as sleep disorders. The various techniques and practices are followed by numerous researchers for the diagnosis of the unusual behaviors which increase the disturbances in sleep and also encourage other sleep disorders. In this paper, a step has been taken towards the early detection of a few sleep disorders like Sleep Apnea, Insomnia, Parasomnia and Snoring using artificial neural network algorithms. The prior detection of these disorders can reduce the further effects on human body. This paper presents the comparison of four training algorithms gradient descent, quasi newton, conjugate gradient and Bayesian regularization by using different training functions such as trainrp, trainlm, trainscg and trainbr respectively. All these algorithms are trained by the data set acquired from various physicians. From the results, it is found that Bayesian regularization algorithm which is trained by using trainbr training function provides the best result for early detection of sleep disorders as per chosen sample size of 95 patient records.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114551011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A survey on defect and noise detection and correction algorithms in image sensors 图像传感器中缺陷和噪声检测与校正算法的研究进展
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164803
Abhishek Jain, Richa Gupta
{"title":"A survey on defect and noise detection and correction algorithms in image sensors","authors":"Abhishek Jain, Richa Gupta","doi":"10.1109/ICACEA.2015.7164803","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164803","url":null,"abstract":"This paper presents a survey on various novel defect and noise detection and correction algorithms used in CMOS image sensors. This class of sensors is extremely relevant in number of applications in the areas of gaming, security, medical, automotive, high-end camera market, etc. This survey outlines the algorithms and the hardware implementation of novel defect and noise detection and correction schemes to detect and correct defective pixels, and discusses their performance and advantages in terms of their applications. Experimental results on various images illustrate the capabilities of the studied approaches.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128324718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fast scale invariant multi-view face detection from color images using skin color segmentation & trained cascaded face detectors 使用皮肤颜色分割和训练的级联人脸检测器从彩色图像快速缩放不变多视图人脸检测
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164779
Ashish Gor, Malay S. Bhatt
{"title":"Fast scale invariant multi-view face detection from color images using skin color segmentation & trained cascaded face detectors","authors":"Ashish Gor, Malay S. Bhatt","doi":"10.1109/ICACEA.2015.7164779","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164779","url":null,"abstract":"Face detection is important step in face recognition, expression analysis, security, surveillance which has challenges due to multiple scales, views, rotations of faces & false background objects. Skin color segmentation, connected component extraction & correlation analysis on image is done to reduce search space & to improve detection rate. Cascaded face detectors are trained using Viola & Jone's Adaboost based Machine learning algorithm for each possible range of views & possible rotations. Segmented regions of 16*16 sizes are given to Cascaded face detectors to verify the presence of face. Experimental results show that it has very good detection rate for frontal & remarkable rate non-frontal, multi-view faces with negligible time duration in poor background/weather/lighting conditions.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129080261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modified approximate lower triangular encoding of LDPC codes LDPC码的改进近似下三角编码
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164731
Arijit Dutta, A. Pramanik
{"title":"Modified approximate lower triangular encoding of LDPC codes","authors":"Arijit Dutta, A. Pramanik","doi":"10.1109/ICACEA.2015.7164731","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164731","url":null,"abstract":"LDPC codes have become the most popular error control code in various fields like telecommunication, magnetic recording etc. due to their high error correcting capability. The Approximate Lower Triangular (ALT) encoding is the most commonly used encoding technique of LDPC codes. This technique though elegant suffers from the shortcoming that when a particular sub matrix of the H matrix obtained after ALT encoding is singular, the technique fails. In this paper a new algorithm is proposed to handle this shortcoming. In this work a new algorithm is proposed to bring any rectangular sparse LDPC matrix into a rectangular part and a square upper triangular part. This algorithm is implemented to encode a general H matrix. This algorithm is further appended to the ALT format of LDPC encoding and another efficient encoding technique is proposed for LDPC code. Both the proposed techniques have a pre-processing step followed by the actual encoding step. Scatter plots of the H matrices (after preprocessing) are shown. BER performance of the new Modified ALT technique is compared with the existing Systematic Approximate Lower Triangular method. The proposed algorithm gives better BER performance.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121312952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Narrowing awareness gap by using e-learning tools for counselling university entrants 通过使用电子学习工具为大学新生提供咨询,缩小认识差距
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164822
P. Goyal, Amit K. Agarwal, Tanya Kukreja, N. Khanna
{"title":"Narrowing awareness gap by using e-learning tools for counselling university entrants","authors":"P. Goyal, Amit K. Agarwal, Tanya Kukreja, N. Khanna","doi":"10.1109/ICACEA.2015.7164822","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164822","url":null,"abstract":"Higher Education is very crucial factor for the growth and development of individuals, and this contributes significantly to social, economic and scientific development of the country. Making an admission decision for higher education is a very challenging and critical for a student's success, especially with the rapid increase in number of different options available. A questionnaire survey of more than 400 engineering college entrants in India, was conducted at the time of their counselling. The survey reveals that there is a need for counselling the entering students to help them better evaluate the different universities that they are considering for their under-graduate admissions, and making the students more aware of the different ranking parameters that are also used by several popular university ranking systems, nationally and internationally. We also discuss how the existing awareness gap can be narrowed using appropriate E-learning tools in order to improve the qualitative and quantitative variety of the learning environment as a whole.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121333021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deployment of secure sharing: Authenticity and authorization using cryptography in cloud environment 安全共享的部署:云环境中使用加密的真实性和授权
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164823
Akanksha Upadhyaya, Monika Bansal
{"title":"Deployment of secure sharing: Authenticity and authorization using cryptography in cloud environment","authors":"Akanksha Upadhyaya, Monika Bansal","doi":"10.1109/ICACEA.2015.7164823","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164823","url":null,"abstract":"Cloud computing is a cost-effective, scalable and flexible model of providing network services to a range of users including individual and business over the Internet. It has brought the revolution in the era of traditional method of storing and sharing of resources. It provides a variety of benefits to its users such as effective and efficient use of dynamically allocated shared resources, economics of scale, availability of resources etc. On the other part, cloud computing presents level of security risks because essential services are often controlled and handled by third party which makes it difficult to maintain data security and privacy and support data and service availability. Since cloud is a collection of machines called servers and all users' data stored on these machines, it emerges the security issues of confidentiality, integrity and availability. Authentication and authorization for data access on cloud is more than a necessity. Our work attempts to overcome these security challenges. The proposed methodology provides more control of owner on the data stored on cloud by restricting the access to specific user for specific file with limited privileges and for limited time period on the basis of secret key using symmetric as well as asymmetric mechanism. The integrity and confidentiality of data is ensured doubly by not only encrypting the secret key but also to the access permission and limited file information.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124299890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A priority based job scheduling algorithm using IBA and EASY algorithm for cloud metaschedular 基于IBA和EASY算法的基于优先级的云元调度任务调度算法
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164647
Kalka Dubey, Mohit Kumar, M. Chandra
{"title":"A priority based job scheduling algorithm using IBA and EASY algorithm for cloud metaschedular","authors":"Kalka Dubey, Mohit Kumar, M. Chandra","doi":"10.1109/ICACEA.2015.7164647","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164647","url":null,"abstract":"Job scheduling (JS) is one of the most important issues in a Cloud system. The objective of job schedulers in cloud computing is to meet users' requirements and optimize the utilization of cloud resources. To achieve better QoS with high resource utilization in a cloud environment, an improved backfill algorithm (IBA) using balanced spiral (BS) method can be used. Results show that IBA minimizes resource idleness up to a great extent. However, IBA does not provide support for handling job priority and QoS. We need an algorithm to maximize the resource utilization while considering priority.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124334259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Web application for analysis of CSS styling issues and Gurmukhi fonts for Punjabi website 用于分析旁遮普语网站的CSS样式问题和Gurmukhi字体的Web应用程序
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164740
S. Singal
{"title":"Web application for analysis of CSS styling issues and Gurmukhi fonts for Punjabi website","authors":"S. Singal","doi":"10.1109/ICACEA.2015.7164740","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164740","url":null,"abstract":"There are many CSS styling issues in the display of regional languages. This paper describes the CSS styling issues for Punjabi language. A number of Punjabi websites have been analyzed to find out the CSS styling issues. The websites use Unicode and non-Unicode Gurmukhi fonts to write the content in Punjabi. But, the non-Unicode Gurmukhi fonts may not be compatible with the user's system. The analysis for the same is also presented in this paper. To find out more related problems, a web application has been designed using which the end user can apply the CSS styles to his/her own Punjabi text. The effect of applying the CSS styles may vary for different operating systems as well as for different web browsers. The issues reported by the end user will be saved in a database for analysis.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126429753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of CMRS rock mass rating using fuzzy logic 用模糊逻辑预测cmr岩体质量等级
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164685
Devanand, Naveen Kumar
{"title":"Prediction of CMRS rock mass rating using fuzzy logic","authors":"Devanand, Naveen Kumar","doi":"10.1109/ICACEA.2015.7164685","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164685","url":null,"abstract":"CMRS (Central Mining Research Station) Geomechanical rating of rock mass is a classification system based on the various parameters which was defined by CMRS. The rating system may possess some fuzziness in its practical applications. For example, groundwater seepage and weatherability (measured by I Cycle slake durability) are related by experts in linguistic terms with approximation. Descriptive terms vary from one expert to another, while in the RMR system values which are related to these terms are probably the same. On the other hand, sharp transitions between two classes create uncertainties. So it is proposed to determine new weight interval for these parameters. Fuzzy model based on the Mamdani algorithm was introduced to evaluate proposed weights, so that the linguistic approximation based problem could be solved. Further, experiments are done with some of coal mines areas where this fuzzy based rock mass rating gives more satisfactory result than the existing CMRS rating techniques.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131384460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of feature extraction techniques for hyperspectral image classification 高光谱图像分类特征提取技术评价
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164795
Diwaker, M. Dutta
{"title":"Assessment of feature extraction techniques for hyperspectral image classification","authors":"Diwaker, M. Dutta","doi":"10.1109/ICACEA.2015.7164795","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164795","url":null,"abstract":"Using image classification methods to produce thematic maps from hyperspectral data is a challenging image processing task. Feature extraction is an important preprocessing operation to reduce the dimensionality of hyperspectral while preserving most of the information. This research work investigates some of the widely used feature extraction techniques and provides and accuracy analysis by performing experiments on a real dataset. A comparative performance analysis of some of the most important techniques including principle component analysis (PCA), Decision Boundary Feature Extraction (DBFE), and discriminative analysis feature extraction (DAFE) is provided in this work. The classification is carried out using statistical and neural network classifiers. The experimental results shown that DBFE has yielded best accuracy classification among the investigated techniques.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134106434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信