{"title":"GP-GPU based high-performance test equipment for debugging radar digital units","authors":"R. Badarinath, M. Abhilash","doi":"10.1109/SAPIENCE.2016.7684173","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684173","url":null,"abstract":"Modern active phased array radars are made to optimize the size, weight and power without compromising its capability to combat with advanced electronic warfare. To accomplish this task, the signal is digitized at element level or at sub-array level and processed with the help of advanced digital signal processor. Proving the capabilities of this firmware at bench level helps to reduce the overall development time. Hence, it is necessary to have a built-in test unit or test vector generator to verify the optimal performance of digital modules. The best way to accomplish this goal is to use a high speed baseband I & Q radar data generator which helps in testing, identifying and segregating the problems at various stages. In this paper we have explored the capability of latest general purpose graphical processing unit (GP-GPU) as software defined built in test vector generator with high throughput for active array radar applications.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114153589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient video Steganography technique for secured data transmission","authors":"Dhanya Job, V. Paul","doi":"10.1109/SAPIENCE.2016.7684125","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684125","url":null,"abstract":"Secured data transmission is an important problem faced by everyone nowadays. Steganography is an efficient technique to provide secure data transmission over the network, as the number of users increases effectively. This paper, proposes a video Steganography technique for secured data transmission. Video Steganography refers to the process of hiding the data into video. The proposed method not only hides the data, but also it converts the original data into secret code. The proposed mechanism is developed using MATLAB and the Peak Signal to Noise ratio are also calculated.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Tandel, Brijesh Modi, Priyasha Gupta, Shreya Wagle, Sujata Khedkar
{"title":"Multi-document text summarization - a survey","authors":"A. Tandel, Brijesh Modi, Priyasha Gupta, Shreya Wagle, Sujata Khedkar","doi":"10.1109/SAPIENCE.2016.7684115","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684115","url":null,"abstract":"In today's world, the daily hustle-bustle does not permit a human being to devote time for manually summarizing various lengthy documents. Hence it is of utmost importance to devise an application that will facilitate automated text summarization. Not only will this application save time but also render higher scope of efficiency. This application will allow the user to automatically summarize relevant information from various sources.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127888826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of election result by enhanced sentiment analysis on twitter data using classifier ensemble Approach","authors":"R. Jose, Varghese S. Chooralil","doi":"10.1109/SAPIENCE.2016.7684133","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684133","url":null,"abstract":"Sentiment analysis is the computational study of opinions, sentiments, evaluations, attitudes, views and emotions expressed in text. It refers to a classification problem where the main focus is to predict the polarity of words and then classify them into positive or negative sentiment. Sentiment analysis over Twitter offers people a fast and effective way to measure the public's feelings towards their party and politicians. The primary issue in previous sentiment analysis techniques is the determination of the most appropriate classifier for a given classification problem. If one classifier is chosen from the available classifiers, then there is no surety in the best performance on unseen data. So to reduce the risk of selecting an inappropriate classifier, we are combining the outputs of a set of classifiers. Thus in this paper, we use an approach that automatically classifies the sentiment of tweets by combining machine learning classifiers with lexicon based classifier. The new combination of classifiers are SentiWordNet classifier, naive bayes classifier and hidden markov model classifier. Here positivity or negativity of each tweet is determined by using the majority voting principle on the result of these three classifiers. Thus we were used this sentiment classifier for finding political sentiment from real time tweets. Thus we have got an improved accuracy in sentiment analysis using classifier ensemble Approach. Our method also uses negation handling and word sense disambiguation to achieve high accuracy.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125537308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Data Mining in Higher Secondary Directorate of Kerala","authors":"S. Mathew, John T. Abraham","doi":"10.1109/SAPIENCE.2016.7684139","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684139","url":null,"abstract":"In this paper, we discuss Data Mining and its application in Higher Secondary Directorate of Kerala. Data Mining process has a set of functionalities among which classification has wide application in real world data processing. We examine the Naïve Bayes classification techniques. In the third section, we explain Naïve Bayes Theorem using an experiment. This experiment covers attributes like School Type, Candidate Type, Study Type, Districts, etc. These attribute values, we are using to analysing the result of Higher Secondary First Year Improvement Examination held in September 2015. This will improve the performance and data processing speed of Higher Education Directorate. This paper demonstrates the application of Data Mining in Higher Secondary Examination result. This will help further research and will improvise the activity of Higher Secondary Directorate.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122179039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Babu, Kudakwashe Dube, S. Mukhopadhyay, H. Ghayvat, Kumar M. V. Jithin
{"title":"Accelerometer based human activities and posture recognition","authors":"A. Babu, Kudakwashe Dube, S. Mukhopadhyay, H. Ghayvat, Kumar M. V. Jithin","doi":"10.1109/SAPIENCE.2016.7684120","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684120","url":null,"abstract":"The quantity of elderly people like to live in their homes, secluded, in their brilliant age is expanding exponentially. This is not a perfect path for an elderly individual to live. However, the urbanization and resultant change of the social and social conduct makes it a more regular event. Falls are a noteworthy reason for death and horribleness in more established grown-ups. In this way, it has turn into an opportune need to create mechanized look after the elderly. The first end, purpose of such fall computer looking-glass is to ready caregivers of the fall event, which can then start an earlier process. In the present study, we amplify the use of wearable inertial sensors for fall identification and information of human posture and activities, by creating and assessing the precision of a sensor framework for identifying the same. We found that our system could discover fall events and monitor human activities with at least 95% accuracy.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127113997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective communication framework for data management using query caching in Mobile Location based Services (LBS)","authors":"R. Gobi, E. Kirubakaran","doi":"10.1109/SAPIENCE.2016.7684119","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684119","url":null,"abstract":"Technology has transformed the mobile phone as a big medium for communication and offered a pool of services to the subscriber. Among those services, Location Based Services (LBS) is prominent to get services based on current geographic location. The services include right from information to entertainment and the services offered by LBS are highly dynamic because its access pattern is different from one location to another location. It directly deals with positioning the location and providing the information. Since it deals with dynamic and real time, conventional data handling techniques may not suitable and there are several issues like increased communication cost, increased query processing time, in-ability of accurate positioning needs to be addressed to utilize the full benefit of LBS. Hence this research work focuses on providing solution for data management issues. Based on classification of applications and categorization of services in LBS, a communication framework (ComFrame) with several layers is proposed. The framework applies a data management technique called q-caching to store user's frequent queries in Cache Manager (Local Manager), and this approach has been implemented in both on client and server side with Android API and Java Remote Method Invocation (RMI) services. The proposed scheme results in reduced communication cost, query handling time and data volume by applying Cost Benefit Analysis techniques. In summary, dynamic data management principles enhances Mobile Location based Services. This framework can further be enhanced to Governance and Business sectors for effective utilization of mobile data management in future.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127266562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on Down syndrome detection based on Artificial Neural Network in Ultra sonogram images","authors":"Devi V. K. Vincy, R. Rajesh","doi":"10.1109/SAPIENCE.2016.7684172","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684172","url":null,"abstract":"Down syndrome is a genetic disorder in which disrupts infants, physical and cognitive development. Down syndrome is characterized by the absence of nasal bone during the late first trimester of pregnancy. Presently Down syndrome is identified by visually examining the ultra sonogram image of foetus of 11 to 13 weeks of gestation for the presence of nasal bone. The visually identification by the change in the contrast of nasal bone region of ultra sonogram is a very difficult task. So the image processing based features extraction by considering various parameters have been extremely important. This paper provides comprehensive survey on various medical imaging techniques that can be effectively used for detecting the syndrome in the early stage of pregnancy. Our proposed survey consider different methods based on the various parameters extracted using a series of operations such as Region Of Interest (ROI), Nasal Bone (NB) segmentation using morphological, Otsu thresholding and logical operations from the ultra sonogram images, both in spatial domain as well as transform domain using Discrete Cosine Transform (DCT) and wavelet transforms. The extracted data is normalized and used to train classifiers like Back Propagation Neural Network (BPNN). This paper illustrates overview of various states of methods available in the Down syndrome detection and comparison analysis of each method is discussed.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132887068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods to detect different types of outliers","authors":"D. Divya, S. Babu","doi":"10.1109/SAPIENCE.2016.7684114","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684114","url":null,"abstract":"Outliers are those data that deviates significantly from the remaining data. Outliers has emerging applications in irregular credit card transactions, used to find credit card fraud, or identifying patients who shows abnormal symptoms due to suffering from a particular type of disease. This paper gives an idea about the various approaches and techniques used in outlier detection and the areas in which outlier detection is used and also about how outlier detection is handled in higher dimensional data.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115917852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified autonomy oriented computing based network immunization by considering betweenness centrality","authors":"Susan K. Paul, Biju Abraham Narayamparambil","doi":"10.1109/SAPIENCE.2016.7684128","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684128","url":null,"abstract":"As many people rely on Internet and mobile phone for many applications, it is very crucial for society. Networks, formed by the connection of devices following some relationships among users, provide good platforms for virus spread. Viruses can cause data leakage and can even jam wireless services by sending thousands of Spam messages, and reduce the quality of voice communication. In order to protect devices from virus attack several immunization methods are used, where some nodes in a network are immunized so that they cannot be infected by a virus. Due to high cost of immunization, the main aim of immunization becomes how to immunize a small or minimum number of important nodes in order to prevent a virus from spreading to major parts of the network. Most of the immunization methods are executed in centralized and static networks but in actual situation computer networks are decentralized, dynamic and scalable in nature. In the method discussed here some entities are deployed into the network, these entities interact with each other to locate highly connected nodes. The goal of this work is to implement modified AOC based immunization by considering betweenness centrality and analyze its results on different network topology.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115384963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}