{"title":"PAR: A proactive queue mechanism for multi-hop wireless networks","authors":"M. Jude, S. Kuppuswami","doi":"10.1109/ICECA.2017.8212766","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212766","url":null,"abstract":"In this paper, a new queuing mechanism called proactive agile response (PAR) Queue proposed for the multi-hop wireless node that regulates the queue buildup and stabilizes the traffic flows under heavy traffic condition. The PAR uses multilevel packet marking with no additional computational complexity that notifies and controls congestion at its incipient stage. The PAR queuing algorithm supports dual queue approach, the principal buffer store data packets and the auxiliary buffer for control data packets, thereby ensuring no loss of packets due to buffer overflows. The simulation results were clear and convincing that the proposed PAR outperforms the existing standard queue mechanisms with greater improvement in throughput and reduction delay and dropping probability for different traffic conditions.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131096085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real time Android app based respiration rate monitor","authors":"R. Bhattacharya, N. Bandyopadhyay, S. Kalaivani","doi":"10.1109/ICECA.2017.8203633","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203633","url":null,"abstract":"Respiration rate is monitored in most diseases, especially ones like sleep apnea and respiratory arrest. However, most devices available for monitoring are expensive, fragile and often need trained staff for operation. For obvious reasons, constantly monitoring the patient's breathing rate is also not feasible and our proposed module tends to modify this scenario. The hardware module uses a thermistor to monitor the patient's breathing rate. This is less costly, and also involves low power consumption as well as robust performance. The device also uses cloud computing to transmit the data to the doctor's smartphone app as well as to the patient's relatives' correspondence. A buzzer attached to the system notifies nearby medics in case of abnormal breathing rates. The device is specially adapted to suit rural Indian conditions. The prototype has been substantiated for accurate monitoring of breathing rates through the standard tests.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132575593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Eigenface method through through facial expression recognition","authors":"Prashant Shakyawar, Pkumar Choure, Upendra Singh","doi":"10.1109/ICECA.2017.8212714","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212714","url":null,"abstract":"The Eigenface method is a classic face recognition method. This article is based on the method of Eigen face to recognize the facial expression. The aim of this method is to recognize the facial expression stored in a database. It uses a set of single static image with different expression labels as the training database, projected the training image to subspaces. The similar face of the tested expression in the training database is calculated out by it, and gave out the label of that face as the recognition result and its expressions. Several shortages of this Eigen face method were demonstrated by the result in face expression recognition. Due to its dependency on the gray level similarity of the training image set and the given test image, it would be greatly influenced while the light, angle, face size and face color.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133342694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting student's performance using CART approach in data science","authors":"Madhav S. Vyas, Reshma R. Gulwani","doi":"10.1109/ICECA.2017.8203614","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203614","url":null,"abstract":"In technical graduate courses like engineering, it is very important that students are monitored during their first year. It is important for all technical graduates to have a good programming insight. Still, a student shying away from the core subjects like programming is common phenomena in engineering colleges nowadays. It is thus necessary to keep track of students' performance during the first year of the course especially. During semester beginning, poor performance further creates disinterest in students and hence the end result is low whether it is on semester card or it is their knowledge level. It gives a scope for us to apply data science techniques to analyze and predict a student's performance. To address this problem we propose a system which will make use of the decision tree approach to predict a student's performance. Based on student's current performance and some measurable past attributes the end result can be predicted to classify them among good or bad performers. It will thus enable a faculty to pay attention to the weak students and plan sessions for them accordingly. A student's interest in programming or other core subjects can be monitored and encouraged as needed.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133962265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vinit Sathe, P. Gupta, Karan Kaushik, Suvarna Bhat, Sachin Deshpande
{"title":"Virtual reality websites(VR WEB)","authors":"Vinit Sathe, P. Gupta, Karan Kaushik, Suvarna Bhat, Sachin Deshpande","doi":"10.1109/ICECA.2017.8203619","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203619","url":null,"abstract":"Virtual reality or virtual realities[1] (VR), also known as immersive multimedia or computer-simulated reality, is a computer technology that replicates an environment, real or imagined, and simulates a user's physical presence and environment to allow for user interaction. This paper aims to bring to the foreground, advancements in the field of Virtual Reality in the domain of web development, for building virtual reality enabled templates which can be used to create Software as a service (SaaS). Consumers can utilize these templates and create their own virtual reality based webpage. Our system will be implemented using WebVR, a language that can access the gyroscope sensor present in smartphones to calculate the coordinates of the phone with respect to the surroundings. It combines HTML and JavaScript like functions to provide a strong set of tools for creating VR enabled websites.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131892110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power spectral density and KNN based adaboost classifier for epilepsy classification from EEG","authors":"H. Rajaguru, S. Prabhakar","doi":"10.1109/ICECA.2017.8203722","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203722","url":null,"abstract":"In the arena of biomedical engineering, the classification and analysis of epilepsy from Electroencephalography (EEG) signals forms an important area of research. When the neurons get hyper excited, seizures occur causing a lot of inconvenience and trouble to the patient. For the study of the predominant abnormalities in the cerebral cortex of the brain, EEG is used widely. Due to the long nature of the EEG recordings, it is very difficult for the clinicians and visual experts to analyze the entire waveforms and hence automated detection of seizures from EEG signals came into existence. In this paper, the dimensions of the recorded EEG signals was reduced with the help of Power Spectral Density (PSD) and then the dimensionally reduced values are classified with the help of KNN Based Adaboost Classifier for the classification of epilepsy and the performance metrics are analyzed. Results show that an average accuracy of about 97.53% along with an average Performance Index of about 94.85% is obtained.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134318482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Deshpande, Monika Doke, Aishwarya Deshpande, Anagha Chaudhari
{"title":"Expert system for retrieval of documents using evolutionary approaches incorporating clustering","authors":"S. Deshpande, Monika Doke, Aishwarya Deshpande, Anagha Chaudhari","doi":"10.1109/ICECA.2017.8212847","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212847","url":null,"abstract":"Classification is a central problem in the fields of data mining and machine learning. Using a training set of labeled instances, the task is to build a model (classifier) that can be used to predict the class of new unlabelled instances. Data preparation is crucial to the data mining process, and its focus is to improve the fitness of the training data for the learning algorithms to produce more effective classifiers. Searching for the frequent pattern within a specific sequence has become a much needed task in various sectors. Feature selection is selecting a subset of optimal features. Feature selection is being used in high dimensional data reduction and it is being used in several applications like medical, image processing, text mining, etc. In the existing work, unsupervised feature selection methods using Artificial Bee Colony Optimization Algorithm, Bat Algorithm and Ant Colony Optimization have been introduced. We have compared these three algorithms and concluded that Bat Algorithm proves to be better in performance than the rest. The proposed system will use a novel method to select subset of features from unlabelled data using Bat algorithm with one of the clustering algorithm and develop an expert information retrieval system.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115719701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A modified AODV protocol to detect and prevent the wormhole usingh using hybrid technique","authors":"Amar Singh Chouhan, Vikrant Sharma, Upendra Singh, Roopesh Sharma","doi":"10.1109/ICECA.2017.8212740","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212740","url":null,"abstract":"In Mobile Ad hoc Network (MANET), mobile node is responsible for the route establishment using a wireless link where each node behaves like both, as a host and a router. There are number of security threats in MANET possible because of its open untrusted environment with the little security arrangement. Among all of the security threat, a worm hole is considered to be a very serious security threat over MANET. In a worm hole, the two selfish nodes which are very far away to each other geographically, makes a tunnel between them to hide their actual location and try to believe that they are true neighbors and makes the conversation through the wormhole tunnel. Recently, the research will focus over wormhole detection and prevention, but an enhanced technique having lower network overhead and a lower battery power consumption in order to the longer survival of the network with fast response is needed. In this paper, the technique of dynamic wormhole detection and prevention AODVWWP has been proposed, which is based on a hybrid model that encapsulate the location, neighbor node and the hop count method.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114770633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User tracking using tweet segmentation and word","authors":"M. Nimbarte, Mrunali Omprakash Thakare","doi":"10.1109/ICECA.2017.8203622","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203622","url":null,"abstract":"Many organizations have been reported to create and monitoring targeted Twitter streams to collect a bunch of information and understand according to user's view. Targeted Twitter stream is main usually constructed by filtering tweets and that abused words with predefined selection criteria. Due to its invaluable business value of timely information from these tweets, it's a necessary to understand that abused word's language for a large body of downstream applications, such as named entity recognition (NER), event detecting and summarizing that particular word, opinion mining, sentiment analysis, and etc. In these proposed system application is develope which take tweet is a input and search semantic negative or illegal words from database. Generate report of that abusing words and send to cyber crime's site. Then depending on the tweet, track the related information of the person. Track all the tweets of that particular person and track that person through identification databases. Then take a action by cyber crime. And after that prevent the tweet.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122995433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real time embedded system for accident prevention","authors":"Ancy John, P. Nishanth","doi":"10.1109/ICECA.2017.8212745","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212745","url":null,"abstract":"This paper presents autonomous accident prevention with security enabling techniques, speed control and accident detection system. The main objective is to design an Atmega328P controller to monitor the zones, which can run on an embedded system and to automatically locate the site of accident and alert concerned people. It should be done automatically as the person involved in the accident may not be in a circumstance to send the information [7]. The proposed system is composed of two separate design units: transmitter unit and receiver unit. Just before the vehicle is in the transmitter zone, the vehicle speed is controlled by receiving the signal from the RF transmitter. For this, RF transmitter can be kept at a few meters before the zone. Security system includes alcohol sensor, eye sensor and smoke sensor. Accident detection system comprises of GPS and GSM in cell phones [13]. As collision occurs, piezoelectric sensor will detect the signal and sends it to ATmega328P microcontroller [6]. Then, the GPS available in the smart phone will start communicate with the satellite and get the latitude and longitude values and name of place of accident will be send to the previously set phone numbers of relatives, ambulance services etc [5].","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"46 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122552570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}