2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)最新文献

筛选
英文 中文
Prediction of difficulties in Intubation using an Expert system 使用专家系统预测插管困难
D. K. Sreekantha, Rodrigues Rhea Carmel Glen, Prajna M K, Sripada G. Mehandale, Roline Stapny Saldanha, Gowda Jotsna Krishnappa
{"title":"Prediction of difficulties in Intubation using an Expert system","authors":"D. K. Sreekantha, Rodrigues Rhea Carmel Glen, Prajna M K, Sripada G. Mehandale, Roline Stapny Saldanha, Gowda Jotsna Krishnappa","doi":"10.1109/DISCOVER47552.2019.9007952","DOIUrl":"https://doi.org/10.1109/DISCOVER47552.2019.9007952","url":null,"abstract":"Expert anesthesiologist inserts a tube into the respiratory passage of the patient who is undergoing surgery in Intensive Care Unit or Operation Theater. The patient is unable to breath on their own during the surgery. This process helps in providing artificial assistance in breathing and prevents suffocation. Any interruption in oxygen supply or difficulties in intubation may result in acute internal body damages or may lead to death of the patient. Authors have carried out a literature review and field study to identify list of risk parameters leading to difficulty in intubation. Only 1 to 5 percentage of patients who are undergoing intubation suffer from difficult intubation. There is an acute shortage of expert anesthesiologist in hospital and employing an expert anesthesiologist will be very expensive. In US anesthesiologist have to perform at least 150 successful intubations in first pass to consider him as an expert. The author's main aim for designing an expert system using machine learning algorithms was to predict the difficulties in securing airway and also create an allocation system which allocates an expert anesthesiologist for difficult cases based on the results produced by the system. This paper discusses the procedure to carry out Intubation to emulate the high cognitive process of an expert anesthesiologist. The outcomes of the prediction process divides intubation into easy, difficult and impossible. The authors have designed framework of data sets, risk parameters, rules and algorithms. The expert system gives the prediction results of difficulty in intubation which will be validated by expert anesthesiologist.","PeriodicalId":274260,"journal":{"name":"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115618719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network based Speech Assistance tool to enhance the fluency of adults who stutter 基于神经网络的语言辅助工具,提高成人口吃者的流利程度
Sharan Narasimhan, R. Rao
{"title":"Neural Network based Speech Assistance tool to enhance the fluency of adults who stutter","authors":"Sharan Narasimhan, R. Rao","doi":"10.1109/DISCOVER47552.2019.9008034","DOIUrl":"https://doi.org/10.1109/DISCOVER47552.2019.9008034","url":null,"abstract":"Millions of adults suffer from a condition called stuttering or stammering. The authors propose the use of a Speech Assistance tool, which helps stuttered speakers achieve higher fluency and a slower rate of speech. The fluency is achieved by adhering to the proposed fluency enhancing technique. The fluency enhancing technique (FET) is inspired by fluency shaping methods and requires the speaker to use a rhythmic method called gentle onset with words and a slower rate of speech. In the training mode, the Speech assistance tool trains an artificial neural network to identify the speaker's FET based words vs. the non-FET or normal words. The audio features are represented using Mel-Frequency Cepstral Coefficients (MFCC), which captures the prosody of the spoken words. In the real-life conversation mode, the speaker gets visual cues to ensure that the speaker adheres to the proposed FET technique. The tool also performs disfluency analysis and provides feedback to users, in terms of FET words ratio, the disfluency score for a hundred words, and the speech rate. The tool also logs the disfluencies periodically to help the speaker track his/her fluency over time. The DTW analysis of MFCC features proven that there is a clear difference in the prosody of the FET and non-FET words. While using the proposed FET based tool, the fluency of the speaker increases and slower speech rate is also achieved. The Speech assistance tool can be used along with Cognitive Behavior Therapy to help rehabilitate adults who stutter.","PeriodicalId":274260,"journal":{"name":"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114605406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine learning based sensitivity analysis for the applications in the prediction and detection of cancer disease 基于机器学习的敏感性分析在癌症疾病预测和检测中的应用
Sugandha Saxena, S. Prasad
{"title":"Machine learning based sensitivity analysis for the applications in the prediction and detection of cancer disease","authors":"Sugandha Saxena, S. Prasad","doi":"10.1109/DISCOVER47552.2019.9008083","DOIUrl":"https://doi.org/10.1109/DISCOVER47552.2019.9008083","url":null,"abstract":"Machine learning is used in almost all the medical fields by the diagnostics and doctors especially in predicting and detecting the risk of cancer. This growing trend of machine learning utilization in this approach enables the researchers to survey on the various types and approaches of machine learning or deep learning methods. Many methods are noted including an increased dependence on protein biomarkers and micro array data, increasing application leads to various types of cancer and instead of depending on an older Artificial Neural Network (ANN) methods, a newer trend of more interpretable machine learning methods are used. From the recent studies in the field, it is observed that machine learning or deep learning methods can be used appropriately in the range (20-30%) to improve the accuracy of prediction, development and progression, recurrence and mortality. In this paper, it is proved that unsupervised learning techniques could be used for predicting and detecting cancer tissues and appropriate analysis would be done on the data. The major merits of the proposed method over the existing cancer detection methods is the possibility of applying data from different types of cancer which describes the feature automatically and it helps to enhance the prediction and detection capabilities very specifically.","PeriodicalId":274260,"journal":{"name":"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121475013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fog computing enabled Ambient Assisted Healthcare systems 雾计算支持环境辅助医疗保健系统
Vivek Dave, N. Joshi
{"title":"Fog computing enabled Ambient Assisted Healthcare systems","authors":"Vivek Dave, N. Joshi","doi":"10.1109/DISCOVER47552.2019.9007916","DOIUrl":"https://doi.org/10.1109/DISCOVER47552.2019.9007916","url":null,"abstract":"There is a severe need for continuous monitoring of health condition and behaviour of patients, dependents, and senior citizens. Often such people require continuous presence of medical staff for observing health condition and behaviour. However, unavailability of such medical observers at certain places and at certain locations may result into failure from obtaining sudden spikes in such patient's health parameters and behaviour. In order to prevent such failures, advantage of recent advancements in ICT and IoT can be taken in development of Ambient Assisted Healthcare (AAHC) systems. AAHC systems provide self-care support to people suffering with health problems or disabilities. Cloud computing enabled AAHC systems are available. However, study suggests that evolution of intelligent devices and fog computing has coined many crucial challenges against the cloud computing based solutions. Fog computing helps overcome such deficiencies. A detailed review of fog computing based existing AAHC systems is presented in this paper.","PeriodicalId":274260,"journal":{"name":"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133790211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Overview On 5G-Massive MIMO Cellular Communication 5g -大规模MIMO蜂窝通信综述
H. S. Kamath, Adarsh
{"title":"Overview On 5G-Massive MIMO Cellular Communication","authors":"H. S. Kamath, Adarsh","doi":"10.1109/DISCOVER47552.2019.9008074","DOIUrl":"https://doi.org/10.1109/DISCOVER47552.2019.9008074","url":null,"abstract":"Massive MIMO is most fundamental and the basis of 5G. Whole evolution from older generation to 5G in context of data speed, huge amount of data traffic handling capacity, decrease in response time, providing very large range of bandwidth, increase in coverage are, high energy efficiency and many others has been done due to this new technology called Massive MIMO. It is the basic building block for 5G, whole 5G is built upon Massive MIMO. Objectives: This paper presents the basic working of 5G networks in terms of Massive MIMO and tries to find answer of question like how it increases the capacity of data handling by a huge amount as much as 1000 times more, how it gives such high speeds, what are the concept behind this significant improvements, will there be significant increase in size of BS since massive number of antennas are used. There is also a comprehensive and statistical analysis has been done on Spectral Efficiency and Energy Efficiency giving solid evidence for the improvement in 5G networks. Analysis on various digital signal processing done in Massive MIMO and comparing various processing techniques in terms of complexity and performance. The sole purpose of this paper is to provide the basic understanding on how is 5G networks are actually working and the reason behind there improvements. Brief information is added about the projects running worldwide on Massive-MIMO and its application in future communication systems of next generation. Findings: It has been observed that to provide the performance to such high standards, massive amount of antennas are used at BS to execute a directed beams focused towards users. The size of BS remains same as it was in 4G. There is no significant increase in the size of BS it just that number of transceiver chains increases by the same amount as number of antennas per BS.","PeriodicalId":274260,"journal":{"name":"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131131818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy Preservation Mechanism For The Data Used In Image Authentication 图像认证中数据的隐私保护机制
S. Divya, K. Prema, Balachandra Muniyal
{"title":"Privacy Preservation Mechanism For The Data Used In Image Authentication","authors":"S. Divya, K. Prema, Balachandra Muniyal","doi":"10.1109/DISCOVER47552.2019.9007939","DOIUrl":"https://doi.org/10.1109/DISCOVER47552.2019.9007939","url":null,"abstract":"With the growth in the demand for data exchange between any electronic system, the need for security of the information exchanged has become a necessity. The protection of the information related to the user from getting exposed to unauthorized person becomes a challenging issue. Hence, there is a requirement to encrypt the private user data to maintain the privacy. The paper focuses on maintaining the privacy of the sender information which is used for authentication of the image transmitted in the communication system. By embedding the information of the sender in the encrypted form, privacy for the sender information is obtained. The encryption of the sender data can be performed by using various encryption algorithms. In this work, encryption of the information of the person sending the image which is taken in the form of text file of varying size is performed using blowfish encryption algorithm which is a symmetric key block cipher. The length of the key used in blowfish for encryption and decryption ranges from 32 to 448 bits and the block size used is 64 bits. The structure of the algorithm is fiestal network. The work is implemented using MATLAB.","PeriodicalId":274260,"journal":{"name":"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129059397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/discover47552.2019.9008094","DOIUrl":"https://doi.org/10.1109/discover47552.2019.9008094","url":null,"abstract":"","PeriodicalId":274260,"journal":{"name":"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121700055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework To Study Heuristic TSP Algorithms With Google Maps API 基于Google Maps API的启发式TSP算法研究框架
Ajumal P A, S. Ananthakrishnan, Anubhav Jain, H. N. Athreya, K. Chandrasekaran
{"title":"A Framework To Study Heuristic TSP Algorithms With Google Maps API","authors":"Ajumal P A, S. Ananthakrishnan, Anubhav Jain, H. N. Athreya, K. Chandrasekaran","doi":"10.1109/DISCOVER47552.2019.9008062","DOIUrl":"https://doi.org/10.1109/DISCOVER47552.2019.9008062","url":null,"abstract":"Millions of people depend on the navigation facilities available in smart-phones and web browsers for their daily commutes, planning long trips ahead of time, looking up places etc. Integration of GPS and compass made navigating anywhere in the world a trivial task. Today, there are several applications available that fit the purpose of navigation such as Waze, HereWeGo (previously known as Here Maps by Nokia), Google Maps, etc. When Google Maps was used to embark on a tour that will take us to chosen places by covering the least distance possible, it is observed that none of the aforementioned applications provide such a feature. In this paper, a framework is developed with Google Maps APIs to create such a feature. This problem is mapped to the Traveling salesman problem and tried to solve it using algorithms known for approximating TSP such as Artificial Bee Colony Algorithm, Particle Swarm Optimization and Two-opt Algorithm. The framework is tested with these algorithms and found that, Particle Swarm Optimization gives the best possible route.","PeriodicalId":274260,"journal":{"name":"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117313700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Aging Analysis and Prediction Using AKNN Algorithm 基于AKNN算法的软件老化分析与预测
Arshiya Sultana Shaikh, Sangeeta Sangani
{"title":"Software Aging Analysis and Prediction Using AKNN Algorithm","authors":"Arshiya Sultana Shaikh, Sangeeta Sangani","doi":"10.1109/DISCOVER47552.2019.9007945","DOIUrl":"https://doi.org/10.1109/DISCOVER47552.2019.9007945","url":null,"abstract":"Distributed server's are used in every IT Firm and all the online-local and global communication today is greatly dependent on them. Therefore these servers undergo continuous usage round the clock, As a result of which performance of these servers degrades resulting to software aging. Software aging is the phenomenon that affects the performance of a software system drastically, thereby degrading it when functioning in a long running state. This is generally caused by factors like exhaustion or inappropriate use of system resources, the accumulation of internal errors and so on. In this paper, we are predicting software aging so that necessary precautionary measures can be taken before the server performance is actually affected. This work demonstrates a prediction model by taking NASA server log dataset information as an input. By the use of Modified Apriori and KNN Algorithm (AKNN) together, we are able to identify the number of anomalies successfully. This module fetches necessary information which includes: all the Host ID's that are facing anomaly, along with their respective failure percentages. Greater the failure rates more are the servers prone to aging. Results are discussed using graphical representations. The graphical representations include the sessions queried, Latency, total session duration and finally the number of anomalies detected with respect to computational time. Hence the proposed work combines two algorithms, and successfully predicts aging in a server with better accuracy and faster computational time.","PeriodicalId":274260,"journal":{"name":"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"71 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128013749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Investigation on Thermal-Optical- Current Characteristics of Commercial Light Emitting Diodes 商用发光二极管热光电流特性的实验研究
A. Padmasali, S. Kini
{"title":"Experimental Investigation on Thermal-Optical- Current Characteristics of Commercial Light Emitting Diodes","authors":"A. Padmasali, S. Kini","doi":"10.1109/DISCOVER47552.2019.9007913","DOIUrl":"https://doi.org/10.1109/DISCOVER47552.2019.9007913","url":null,"abstract":"LED lighting is one of the dominant lighting technologies in the current era due to its ability of energy savings and control ability. LED being semiconductor-based diode device, only some amount of input DC current is converted to light output and rest is converted to heat. This work is an experimental investigation of the light output variations at different drive current and operating temperature on light output of the LEDs. The LED light output is linearly dependent on the drive current. But, with increase in drive current light output droop is observed and droop amount increase with increase in operating temperature. In addition, the effect of pulsed and continuous operation of drive current on the light output is studied. The work can be used by LED Luminaire manufacturers to obtain a optimum design based on the operating condition of temperature, drive current and nature of drive current to give maximum possible light output.","PeriodicalId":274260,"journal":{"name":"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126660551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信