2019 2nd International Conference on Signal Processing and Communication (ICSPC)最新文献

筛选
英文 中文
Image sensor based Diffuse Optical Tomographic System 基于图像传感器的漫射光学层析成像系统
2019 2nd International Conference on Signal Processing and Communication (ICSPC) Pub Date : 2019-03-01 DOI: 10.1109/ICSPC46172.2019.8976513
B. Medhi, Rajan Kandhirodan
{"title":"Image sensor based Diffuse Optical Tomographic System","authors":"B. Medhi, Rajan Kandhirodan","doi":"10.1109/ICSPC46172.2019.8976513","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976513","url":null,"abstract":"Diffuse optical tomography (DOT) is a promising biomedical imaging modality that can provide the metabolic state of tissues sitting deep inside body, non-invasively. This health state is mapped from the recovered three-dimensional distribution of optical parameters, estimated from boundary photon-flux measurements. In a conventional DOT imaging system, delivery of probing beam to tissue and photon flux measurements are carried out with the help of dedicated optical fiber arrangements. A modified experimental setup is proposed that replaces the measuring optical fibers by a camera unit, and the experimental results obtained from a tissue mimicking phantom are reported. The camera measures the boundary photon-flux over the region of interest (ROI) space-continuously in a denser grid. The increase of measurements per projection improves the rank of the system matrix and hence reduces the ill-posedness associated with the DOT imaging. Experimental results obtained from a tissue mimicking cylindrical shape phantom are presented that show a good agreement with the known values.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133549389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Epileptic Seizure Classification using MODWT and SVM 基于MODWT和SVM的癫痫发作自动分类
2019 2nd International Conference on Signal Processing and Communication (ICSPC) Pub Date : 2019-03-01 DOI: 10.1109/ICSPC46172.2019.8976816
J. Prasanna, G. S. Thomas, M. Subathra, N. Sairamya
{"title":"Automatic Epileptic Seizure Classification using MODWT and SVM","authors":"J. Prasanna, G. S. Thomas, M. Subathra, N. Sairamya","doi":"10.1109/ICSPC46172.2019.8976816","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976816","url":null,"abstract":"Epilepsy is the neurological disorder that makes tough for epileptic patients to survive a natural life. Because classifying the electroencephalography (EEG) records is a difficult job for the clinician. This study presents effective epileptic seizure detection based on Maximal overlap discrete wavelet transform (MODWT) is proposed for the decomposition of EEG signals. The important features are computed from the decomposed wavelet coefficient based on its statistical measures such as mean and standard deviation. The extracted statistical measures are then classified by using support vector machine (SVM) classifier. In this study provides the classification between normal and focal EEG signals and also between normal and generalized EEG signal. The proposed method is verified using karunya EEG database and it produces the most promising classification performance with an overall accuracy of 95.8%, sensitivity of 92.30%, and specificity of 100 % for the classification of normal and focal EEG signals. Also it provides an accuracy of 91.7%, sensitivity of 85.71%, and specificity of 100 % for the classification of normal and generalized EEG signals.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Doodle Recognition using machine learning for hearing and speech-impaired people 为听力和语言障碍人士使用机器学习的涂鸦识别
2019 2nd International Conference on Signal Processing and Communication (ICSPC) Pub Date : 2019-03-01 DOI: 10.1109/ICSPC46172.2019.8976846
Evangelyn D Monica, Praharsha Davu, Cynthia P Caroline, D. J. Jagannath
{"title":"Doodle Recognition using machine learning for hearing and speech-impaired people","authors":"Evangelyn D Monica, Praharsha Davu, Cynthia P Caroline, D. J. Jagannath","doi":"10.1109/ICSPC46172.2019.8976846","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976846","url":null,"abstract":"In this paper, we test the different classifiers used in machine learning and compare the different accuracies for the doodles which are obtained from Google's Quick Draw Dataset. The classifier with the best accuracy can be fed into an application for the hearing and speech impaired people through which the can be trained to draw their immediate needs, and the machine learning model could classify it into the correct category, so it would be easy for the people nearby to help them.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"311 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116109068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Image Forgery detection on cloud 云图像伪造检测
2019 2nd International Conference on Signal Processing and Communication (ICSPC) Pub Date : 2019-03-01 DOI: 10.1109/ICSPC46172.2019.8976862
A. James, E. Bijolin Edwin, Anjana M C, Angel Mary Abraham, Harsha Johnson
{"title":"Image Forgery detection on cloud","authors":"A. James, E. Bijolin Edwin, Anjana M C, Angel Mary Abraham, Harsha Johnson","doi":"10.1109/ICSPC46172.2019.8976862","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976862","url":null,"abstract":"Every day many digital documents are produced and distributed by televisions, newspapers, magazines, and websites. In all these communication channels images play an important role in communicating the information. Today, it is very easy to manipulate digital images with the help of advanced computer, photo editing software, image processing techniques etc. So, verification of the authenticity of digital images has become a challenging problem. This paper is based on image forgery detection on cloud. Image forger detection is classified into two: passive and active. Active approach includes digital signature and watermarking whereas the Passive approach includes detection of the tampered area using copy move and splicing techniques. Here we are using Canny Edge Detection Algorithm which mainly uses splicing. In this paper, we are also comparing canny edge detection and SSIM. SSIM is more efficient compared to canny edge detector and it gives above 90 % accuracy.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116485425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review on the Monitoring and localization of leakage in water distribution system 配水系统泄漏监测与定位研究进展
2019 2nd International Conference on Signal Processing and Communication (ICSPC) Pub Date : 2019-03-01 DOI: 10.1109/ICSPC46172.2019.8976708
S. Grace, Praisy Stephen, J. Paul, B. M. I. Thusnavis
{"title":"A Review on the Monitoring and localization of leakage in water distribution system","authors":"S. Grace, Praisy Stephen, J. Paul, B. M. I. Thusnavis","doi":"10.1109/ICSPC46172.2019.8976708","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976708","url":null,"abstract":"Internet of Things (IoT) is one of the booming concepts in today's world. These concepts when embedded with technology can communicate and interact over the Internet, and they can be remotely monitored and controlled. Primarily the Internet of Things offers new solutions for improving water management, to maximize effective use of this priceless resource. The major problem faced by today's municipal corporation is unidentified leakages in the water distribution system. It is therefore imperative that pipelines are effectively monitored so as to accurately detect and locate leakages in real time. The proposed system is to identify and detect the location of leakages in the pipelines during water distribution using IoT. In this system a raspberry pi is used as the master device to collect the data from different slave nodes and send the data to the cloud. A notification will also be received in the mobile through an app whenever a leak is detected and located. In this paper a thorough study has been made with the previously published research papers and a comparison is also made with their merits and demerits.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123455652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recent Advances and Countermeasures Against Various Attacks in IoT Environment 物联网环境下各种攻击的最新进展及应对措施
2019 2nd International Conference on Signal Processing and Communication (ICSPC) Pub Date : 2019-03-01 DOI: 10.1109/ICSPC46172.2019.8976527
S. Gautam, Ayasha Malik, Nanhay Singh, Suresh Kumar
{"title":"Recent Advances and Countermeasures Against Various Attacks in IoT Environment","authors":"S. Gautam, Ayasha Malik, Nanhay Singh, Suresh Kumar","doi":"10.1109/ICSPC46172.2019.8976527","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976527","url":null,"abstract":"Over the past some decennium, Internet technology experienced flying growth, extremely in the Internet of Things (IoT). The current improvements that have changed the means of people living, says Smart devices that are able of contacting anybody, anytime and anywhere. In contrast with traditional Internet, an IoT tie sizeable machines, humans, resource-strained gadget/devices and sensors over miscellaneous wired and wireless networks. In this paper, we presented a survey on security of IoT and analyzed the recent, primary concerns that relate to it. This paper probes the security goals of IoT, provides a classification of attacks with their correction, on the basis of layers. The main aim is to find how, when, and why an IoT was compromised or involved in commitment with attack.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131534360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Power Optimization in MAC Protocols for WSN 无线传感器网络MAC协议中的功耗优化
2019 2nd International Conference on Signal Processing and Communication (ICSPC) Pub Date : 2019-03-01 DOI: 10.1109/ICSPC46172.2019.8976600
S. Radha, G. Bala, V. Stephy, Dominic Mary Princy, J. Divya, Johny Rithinika. P Sherene
{"title":"Power Optimization in MAC Protocols for WSN","authors":"S. Radha, G. Bala, V. Stephy, Dominic Mary Princy, J. Divya, Johny Rithinika. P Sherene","doi":"10.1109/ICSPC46172.2019.8976600","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976600","url":null,"abstract":"Wireless Sensor Network (WSN) find its role in applications like smart building, urban surveillance, animal farming etc. The challenge in WSN is to reduce energy consumption and increase the network lifetime. In this work, we have proposed a new technique for MAC protocol to control a few network parameters like jitter, energy, throughput etc. Basic 802.11 MAC and P-MAC are simulated using NS-2.34 and the performances are compared. Power controlled MAC (P-MAC) perform better in terms of energy, throughput. Thereby the network life time is increased and efficient data transmission takes place.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127718930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Epilepsy seizure detection using SWT features and ANN classifier 基于SWT特征和ANN分类器的癫痫发作检测
2019 2nd International Conference on Signal Processing and Communication (ICSPC) Pub Date : 2019-03-01 DOI: 10.1109/ICSPC46172.2019.8976834
Felicia J Mercy, J. Prasanna, G. S. Thomas, Roseline S Belvina, Glory N Evangelin, J. Mabel
{"title":"Epilepsy seizure detection using SWT features and ANN classifier","authors":"Felicia J Mercy, J. Prasanna, G. S. Thomas, Roseline S Belvina, Glory N Evangelin, J. Mabel","doi":"10.1109/ICSPC46172.2019.8976834","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976834","url":null,"abstract":"Epilepsy is a common life-threatening neurological disorder, which is unpredictable and affects around 50 million people worldwide. Electroencephalography (EEG) is a monitoring method used to diagnose epilepsy. It records fluctuations in electrical activities of brain. In this study, Stationary Wavelet Transform (SWT) is used to analyse the EEG signal for classification of focal and normal EEG signal. SWT decomposes EEG signal into approximate and detailed coefficients. From each coefficient the statistical features are extracted and are fed into Artificial Neural Network (ANN) classifier for the discrimination of focal and normal EEG signal. These methods are verified by using Karunya EEG database. This method is achieved an overall accuracy of 98.75%, sensitivity of 98.39%, specificity of 99.16%, positive predictive value (PPV) of 99.16%, negative predictive value (NPV) of 98.33%.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129346343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature Selection and Classification for Analysis of Breast Thermograms 乳房热像图分析的特征选择与分类
2019 2nd International Conference on Signal Processing and Communication (ICSPC) Pub Date : 2019-03-01 DOI: 10.1109/ICSPC46172.2019.8976498
N. Usha, N. Sriraam, N. Kavya, D. Sharath, Ravi Prabha, Bharathi B Hiremath, B. Venkataraman, M. Menaka
{"title":"Feature Selection and Classification for Analysis of Breast Thermograms","authors":"N. Usha, N. Sriraam, N. Kavya, D. Sharath, Ravi Prabha, Bharathi B Hiremath, B. Venkataraman, M. Menaka","doi":"10.1109/ICSPC46172.2019.8976498","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976498","url":null,"abstract":"Breast thermography gives the information of abnormality in the breast which induces an angiogenesis and higher metabolic activity. It is well known fact through thermal analysis, one can infer that the abnormal cancerous breast regions show higher skin surface temperature and can be considered as potential biomarker. This specific study highlights the classification of breast thermograms using tamura and statistical features with Support Vector Machine (SVM) and K-Nearest Neighborhood (KNN) classifiers. Best features were selected using non parametric T -test analysis and the resultant features were used for classification of normal and abnormal breast thermograms. During the simulation study through thermal analysis, all abnormal breast thermograms skin surface temperature was found to be greater than 0.5° C. An overall classification accuracy of 90% and 88.9% was achieved using SVM and KNN classifiers respectively. The application of feature selection techniques outperforms the classifier's performance for the proposed study.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132103812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security issues, Countermeasures and Dynamic queue scheduling for SDWSN SDWSN的安全问题、对策与动态队列调度
2019 2nd International Conference on Signal Processing and Communication (ICSPC) Pub Date : 2019-03-01 DOI: 10.1109/ICSPC46172.2019.8976844
K. Indira, U. Sakthi
{"title":"Security issues, Countermeasures and Dynamic queue scheduling for SDWSN","authors":"K. Indira, U. Sakthi","doi":"10.1109/ICSPC46172.2019.8976844","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976844","url":null,"abstract":"Traditional Wireless Sensor Networks (WSN) contains collection of sensor nodes to record and monitor environmental conditions for current and future analysis. Challenges and issues in WSNs are no proper network management, limited resources such as limited amount of energy, storage and processing power and more vulnerable to attacks due to open medium. As a solution, new paradigm, Software Defined Networking (SDN) is merged with WSN is called Software Defined Wireless Sensor Network (SDWSN) to provide automated dynamic network management, Low energy consumption, scalability, reliability, flexibility and robustness by separating control intelligence and network devices. However, SDWSN introduces new security challenges due to programmability nature of SDN and communication protocol. This brings a need to discuss about security issues in SDWSN and possible solutions. This paper examines possible vulnerabilities, analysis of severities, countermeasure to those attacks and proposed dynamic scheduling to overcome packet drop and congestion before applying any security mechanism to avoid congestion as misconception as attacks and to increase network performance.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"726 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132326462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信