2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)最新文献

筛选
英文 中文
Detection of brain tumor from MRI images by using segmentation & SVM 基于分割和支持向量机的MRI图像脑肿瘤检测
Swapnil R. Telrandhe, Amit Pimpalkar, Ankita A. Kendhe
{"title":"Detection of brain tumor from MRI images by using segmentation & SVM","authors":"Swapnil R. Telrandhe, Amit Pimpalkar, Ankita A. Kendhe","doi":"10.1109/STARTUP.2016.7583949","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583949","url":null,"abstract":"In this paper we propose adaptive brain tumor detection, Image processing is used in the medical tools for detection of tumor, only MRI images are not able to identify the tumorous region in this paper we are using K-Means segmentation with preprocessing of image. Which contains de-noising by Median filter and skull masking is used. Also we are using object labeling for more detailed information of tumor region. To make this system an adaptive we are using SVM (Support Vector Machine), SVM is used in unsupervised manner which will use to create and maintain the pattern for future use. Also for patterns we have to find out the feature to train SVM. For that here we have find out the texture feature and color features. It is expected that the experimental results of the proposed system will give better result in comparison to other existing systems.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116948595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Performance analysis of low voltage, low power dynamic double tail comparator for data convertor application 低电压、低功耗动态双尾比较器在数据转换器中的应用
S. Chiwande, Shailesh P. Akarte
{"title":"Performance analysis of low voltage, low power dynamic double tail comparator for data convertor application","authors":"S. Chiwande, Shailesh P. Akarte","doi":"10.1109/STARTUP.2016.7583918","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583918","url":null,"abstract":"Comparators are the basic fundamental blocks for designing high speed Analog and mixed signal system. It is the challenging task to design high speed comparator when the supply voltage is very small. This paper shows the analysis of Double Tail Comparator according to its dynamic power, static power and leakage current. From the analysis of Double Tail Comparator, a new design is proposed which is a modification of Conventional Double Tail Comparator for very small power, small voltage and high speed operation. Here we Tanner EDA software for designing these comparators with 180 nm technology. We compare the results of both of these comparators. It is shown that from the proposed structure of Double Tail Comparator, the leakage current, static power and dynamic power are significantly reduced. For the supply voltage of 0.8 V, the proposed comparator consumes reduced power of 22.3054 nW and current of 27.8818 nA.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124354665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Face reconstruction and authentication based on wavelet transform and random forest: A review 基于小波变换和随机森林的人脸重构与认证研究进展
Pratik R. Misal, A. Thakare
{"title":"Face reconstruction and authentication based on wavelet transform and random forest: A review","authors":"Pratik R. Misal, A. Thakare","doi":"10.1109/STARTUP.2016.7583938","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583938","url":null,"abstract":"Face authentication is an emerging technique used in many crime detection systems. Numbers of techniques are available for face identification but most of them are based on front view. This paper gives a novel technique for face detection taking in consideration both front and side view of face. The system takes test image as input and compares it with images in dataset For reconstruction it uses mirror edge generation technique. Before reconstruction it applies preprocessing and curve extraction on input image. Random forest with subset technique is used for authentication. The system is very useful in crime detection if frontal view of criminal is not available.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121455209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Increasing quality of service in video traffic using zone routing protocol in wireless networks 在无线网络中使用区域路由协议提高视频业务的服务质量
S. Avudai Selvi, A. Vijayaraj
{"title":"Increasing quality of service in video traffic using zone routing protocol in wireless networks","authors":"S. Avudai Selvi, A. Vijayaraj","doi":"10.1109/STARTUP.2016.7583929","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583929","url":null,"abstract":"Wireless Mesh Network is fetching progressively prevalent mostly due to their flexibility. Wireless Mesh Network consists of consistent wireless routers arranged in a mesh topology, which send the data stream in a multi-trip fashion. ViLBaS concept is an existing concept, which checks all nodes and finds which node, is mostly affected by the congestion. In this concept, OLSR protocol is used to send the packet from sender to receiver. Instead of OLSR protocol, in this proposed system ZRP is used. The same concept can be implementing by using zone routing protocol. Zone routing protocol consists of two protocols: proactive protocol and reactive protocol. If the sender and receiver within the area, “Pro-active” protocol will send the packet directly to the receiver. If it is beyond the zone, a reactive protocol will send the packet to the receiver. The final quality of service parameters checked.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115130752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A proposed framework using CAC algorithm to predict systemic lupus erythematosus (SLE) 基于CAC算法的系统性红斑狼疮(SLE)预测框架
S. Gomathi, V. Narayani
{"title":"A proposed framework using CAC algorithm to predict systemic lupus erythematosus (SLE)","authors":"S. Gomathi, V. Narayani","doi":"10.1109/STARTUP.2016.7583974","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583974","url":null,"abstract":"The paper proposes new framework to predict the chronic Lupus disease. The new algorithm has been proposed which is best suitable for supervised, semi supervised and unsupervised data. The algorithm is named as CAC (Clustering Association and Classification). The best algorithms are selected based on the accuracy. The 8 major attributes to diagnose lupus has been identified and considered for prediction purpose. The new framework is designed with four phases. The analysis of 27 lupus patients has been tabulated. A new tool is being developed to predict using CAC algorithm.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125523942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockage detection in seeder 播种机堵塞检测
Shefali Malhotra, Surabhi Bhosale, P. Joshi, B. Karthikeyan
{"title":"Blockage detection in seeder","authors":"Shefali Malhotra, Surabhi Bhosale, P. Joshi, B. Karthikeyan","doi":"10.17485/IJST/2016/V9I30/98997","DOIUrl":"https://doi.org/10.17485/IJST/2016/V9I30/98997","url":null,"abstract":"Seeder machines in agricultural operations may face real-time problems of plugging due to stubble, stones or unusually large seeds. This paper aims at detecting blockages in the seed tube using an ultrasonic sensor and reporting the same to a smartphone application. The ultrasonic sensor transmits sound waves and uses delay in the received echo signal to measure distance from the sensor to the obstacle (either the flowing seed or the opposite wall of the nozzle). Based on the calculated distance, the flow of seeds through the nozzle can be detected. One such sensor will be placed on each row unit and all these sensors will continuously communicate with a central controller (also placed on the seeder). The sensors will report nozzle-blockage to the controller and the controller will then immediately notify the same to the smartphone user via a graphical real-time application. Looking at the application window, the user will get real-time information about the blocked nozzle in the seeder.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126984964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Review on high utility itemset mining algorithms 高效用项集挖掘算法综述
V. Kavitha, B. Geetha
{"title":"Review on high utility itemset mining algorithms","authors":"V. Kavitha, B. Geetha","doi":"10.5958/2249-7315.2016.00598.0","DOIUrl":"https://doi.org/10.5958/2249-7315.2016.00598.0","url":null,"abstract":"Finding interesting patterns in the database is an important research area in the field of data mining. Association Rule Mining (ARM) finds the items that go together. It finds out the association between items. Frequent Itemset Mining (FIM) finds out the itemset that occur frequently in the database. But this approach misses out the profit and the quantity of item purchased. This is addressed in High Utility Itemset Mining (HUIM). HUIM find the profit generating itemset in the database. Many algorithms have been proposed in this field in the recent years. This paper focuses on reviewing the existing state of art algorithms to create a path for the future research in the area of high utility itemset mining.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130357639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption 增强云安全框架,确认非对称和对称密钥加密的数据安全性
N. Jayapandian, A. M. J. Md. Zubair Rahman, S. Radhikadevi, M. Koushikaa
{"title":"Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption","authors":"N. Jayapandian, A. M. J. Md. Zubair Rahman, S. Radhikadevi, M. Koushikaa","doi":"10.1109/STARTUP.2016.7583904","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583904","url":null,"abstract":"Cloud is a modern business sharing data or information with great effectiveness of infrastructures it plays a major role in world wide. As in the information technology sector defines cloud security is the evolving sub domain of computer security and information security. Here the organization uses the cloud as a many service model (Saas, Pass and Iass)and deployment model (private, public, hybrid and community). In this type of model the responsibilities more for secure the information of the customer, So the organization ensures the different way to monitor and secure the data and information from hacking. They offer suspicious activity for their customer data by enhancing the data with encryption and decryption. Encryption makes the access method of proving the original data to be duplicated form and then the client can also be constructed with the proper decryption of the data to prevent the information from eavesdroppers from accessing Symmetric keys encryption or secret key encryption. The Key should be distributed before transmission between entities, then key play vital role for security. DES is In Asymmetric key encryption or public key encryption on that private and public keys are used in the encryption level on cloud. The Public key is used for encrypting the file and private key is used to decrypt the file. Because user tends to use two keys public this is known to public and private who is known to the user a type of algorithm such as RSA. Here we analysis the document is encrypted and then which efficient in that way of approach.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131817126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Data analysis and visualization of sales data 销售数据分析和可视化
K. Singh, Rakhi D. Wajgi
{"title":"Data analysis and visualization of sales data","authors":"K. Singh, Rakhi D. Wajgi","doi":"10.1109/STARTUP.2016.7583967","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583967","url":null,"abstract":"Data is being generated very rapidly due to increase in information in everyday life. Huge amount of data get accumulated from various organizations that is difficult to analyze and exploit. Data created by an expanding number of sensors in the environment such as traffic cameras and satellites, internet activities on social networking sites, healthcare database, government database, sales data etc., are example of huge data. Processing, analyzing and communicating this data are a challenge. Online shopping websites get flooded with voluminous amount of sales data every day. Analyzing and visualizing this data for information retrieval is a difficult task. Therefore a system is required which will effectively analyze and visualize data. This paper focuses on a system which will visualize sales data which will help users in applying intelligence in business, revenue generation, and decision making, managing business operation and tracking progress of tasks.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130787855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
“An ABIR and CBIR fusion based techniques for associated image retrieval” 一种基于ABIR和CBIR融合的关联图像检索技术
Swati L. Dudhe, S. Bodkhe
{"title":"“An ABIR and CBIR fusion based techniques for associated image retrieval”","authors":"Swati L. Dudhe, S. Bodkhe","doi":"10.1109/STARTUP.2016.7583920","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583920","url":null,"abstract":"This paper provides the information about image retrieval using the concept of Attribute Base Image Retrieval (ABIR) and Content Base Image Retrieval (CBIR). The retrieval method nominate in paper make use of the fusion of the images multimodal information (visual and textual) which is a recent course in image retrieval researches. In this present paper we will first focus on content based image retrieval (CBIR) for retrieving the required image from large databases. The main goal of content based image retrieval is to efficiently retrieve images that are visually similar to a query image. Image retrieval is the science of locating images from a large database or image sequences that fulfill the specified image need. An image retrieval technique is based on the Scale-Invariant Feature Transform (SIFT) method which is present in this project. It joins two different data mining techniques to get semantically related images these are: association and clustering rules mining algorithm which is nothing but the Bag of Features (BoF). BoF methods are based on order less collection of quantized local image descriptors they remove spatial information and are therefore computationally and conceptually simpler than many alternative methods.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132454964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信