{"title":"Machine learning approach for segmenting glands in colon histology images using local intensity and texture features","authors":"Rupali Khatun, S. Chatterjee","doi":"10.1109/IADCC.2018.8692135","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692135","url":null,"abstract":"Colon Cancer is one of the most common types of cancer. The treatment is planned to depend on the grade or stage of cancer. One of the preconditions for grading of colon cancer is to segment the glandular structures of tissues. Manual segmentation method is very time-consuming, and it leads to life risk for the patients. The principal objective of this project is to assist the pathologist to accurate detection of colon cancer. In this paper, the authors have proposed an algorithm for an automatic segmentation of glands in colon histology using local intensity and texture features. Here the dataset images are cropped into patches with different window sizes and taken the intensity of those patches, and also calculated texture-based features. Random forest classifier has been used to classify this patch into different labels. A multilevel random forest technique in a hierarchical way is proposed. This solution is fast, accurate and it is very much applicable in a clinical setup.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121121154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power and Resource-Aware VM Placement in Cloud Environment","authors":"Neha Garg, Damanpreet Singh, Major Singh Goraya","doi":"10.1109/IADCC.2018.8692118","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692118","url":null,"abstract":"Cloud computing provides various services to the cloud consumers based on demand and pay per use basis. To improve the system performance (such as energy efficiency, resource utilization (RU), etc.) more than one virtual machine (VM) can be deployed on a server. Efficient VM placement policy increases the system performance by utilizing all the computing resources at their maximum threshold limit and reduce the probability to become a server overloaded/underloaded. Overloaded/underloaded servers consume more energy and increase the number of VM migration in comparison to the server which is in a normal state. In this paper, Energy and Resource-Aware VM Placement (ERAP) algorithm is presented. This algorithm considers both, energy as well as central processing unit (CPU) utilization to deploy the VMs on the servers. CloudSim toolkit is used to analyze the behavior of the ERAP algorithm. The effectiveness of the ERAP algorithm is tested on real workload traces of Planet Lab. Results show that ERAP algorithm performs better in comparison to the existing algorithm on the account of the number of VM migrations, total energy consumption, number of servers shutdowns, and average service level agreement (SLA) violation rate. Results show that on average 13.12% energy consumption is minimized in contrast to the existing algorithm.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121221231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bhadrachalam Chitturi, S. Balachander, S. Satheesh, Krithic Puthiyoppil
{"title":"MIS, MVC and MDS in Cyclic Layered Graphs","authors":"Bhadrachalam Chitturi, S. Balachander, S. Satheesh, Krithic Puthiyoppil","doi":"10.1109/IADCC.2018.8692140","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692140","url":null,"abstract":"Graphs are discrete objects with myriad applications in science and engineering. Several graph theoretic problems are shown to be hard. However, for restricted versions of graphs based on the type of restriction the problems that are hard to solve for a general graph become tractable. Layered graphs have been defined and are shown to have applications in social networks and computational molecular biology. We define a new class of graphs called cyclic layered graphs that are related to layered graphs. We pose three problems that can be modeled as graph theoretic problems on cyclic layered graphs. We design efficient algorithms for these problems.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125521673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel hybrid Quantum Protocol to enhance secured dual party Computation over Cloud Networks","authors":"N. Sudhakar Reddy, V. L. Padmalatha, A. Sujith","doi":"10.1109/IADCC.2018.8692128","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692128","url":null,"abstract":"Enhancing the security of the dual party computation is considered as primitive to establish a secured multiparty computation in the geographically distributed networks. With the advent of variously distributed paradigms like Cloud computing, IoT and Fog computing, securing ubiquitous computation that involves multiparty collaboration is considered an open research area that attains the attention of the researchers to develop novel protocols. Addressing the problem of secured computation over the network this paper presents a novel and hybrid quantum protocol in with Quantum key distribution is integrated with 3DES to enhance the secure computations through a quantum channel within the cloud infrastructure. Simulation results of the proposed protocol show that it outperforms many security protocols developed based on quantum resources.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128754388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gaurav Singal, Anurag Goswami, S. Gupta, Tejalal Choudhary
{"title":"Pitfree: Pot-holes detection on Indian Roads using Mobile Sensors","authors":"Gaurav Singal, Anurag Goswami, S. Gupta, Tejalal Choudhary","doi":"10.1109/IADCC.2018.8692120","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692120","url":null,"abstract":"Pot-holes on road will make transportation slower and costly. India has a big network of roads to connect the villages and cities, the authority persons cannot travel across the region for identification of holes. As per advancement in machine learning in recent time, we can use this technology for the identification and patching the pot-holes. As per the recent survey around 400millions, people have a smartphone in India. We can use smartphone sensors (such as Accelerometer and gyroscope) to identify the pot-holes on road and GPS for the location of the pit. The major task of this problem is to capture the data and annotation. We have developed an android app for capturing the value of displacement while travelling on road. We have applied different classification algorithms to sensor raw-data. SVM is the most suitable classification technique for this problem. The android app will sound an alarm when a pothole is detected.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128379553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Kale, Prathamesh Mandke, Hrishikesh Mahajan, Vedant Deshpande
{"title":"Human Posture Recognition using Artificial Neural Networks","authors":"H. Kale, Prathamesh Mandke, Hrishikesh Mahajan, Vedant Deshpande","doi":"10.1109/IADCC.2018.8692143","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692143","url":null,"abstract":"This paper proposes the use of artificial neural networks(ANNs) to classify human postures, using an invasive(intrusive) approach, into 6 categories namely standing, sitting, sleeping and bending - forward and backward. Human posture recognition has numerous applications in the field of healthcare analysis like patient monitoring, lifestyle analysis, elderly care etc. Most importantly, our solution is capable of classifying the aforementioned postures in real-time, by wirelessly(Wi-Fi) acquiring and processing the sensor data on a Raspberry-Pi device with minimal lag. A data-set of 44,800 samples was collected - from 3 subjects - which was used to train and test the neural network. After experimenting and testing with a plethora of network architectures, an optimal neural network architecture(6-9-6) with suitable hyper-parameters was determined which gave an overall accuracy of 97.589%.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116513739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Classification for Underage Detection in Restricted Public Zone","authors":"Megha Agarwal, Somya Jain","doi":"10.1109/IADCC.2018.8692093","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692093","url":null,"abstract":"Image classification technique analyzes images and its features to unmask the underlined facts. The estimation of age via faces is an area of prime research relevance that deals with several challenges because of its rapid emergent flow in real world applications. In this paper a classifier is built which scans the upper body image i.e. facial images of a person to classify a image to detect the age group namely child, adult and old. The sole purpose of the research is to detect the underage people for enhancing the security system. Taking into account the geometrical features along with wrinkle features, underage is detected using three techniques namely KNN (k-nearest neighbor), ANN (Artificial Neural Network), and SVM (Support Vector Machine) classification algorithm.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126569315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Technique of Image Fusion Using Cloud Based Copyright Protection for Data Distribution","authors":"Ashwani Kumar, Sangeeta Gupta","doi":"10.1109/IADCC.2018.8692139","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692139","url":null,"abstract":"Now a day’s the uses of digital content or media is increasing rapidly. So, there is a need to secure the digital document from both unauthorized users and authorized users. In this paper a secure technique of image fusion using hybrid domain for copyright protection and data distribution is proposed. The proposed method provides a secure technique for the digital content in cloud environment. Two services of cloud are used to develop this work which eliminates the role of trusted third party (TTP). Previously the user and content provider rely on this TTP. First is the design of an infrastructure as a Service (IaaS) to store different images with encryption process to speed up the image fusion process and save storage. Second is a Platform as a Service (PaaS) to enable the digital content to achieve great computation power and to increase the bandwidth. These two services provided by the cloud plays a very important role because it reduces communication overhead in the process of image fusion. Imperceptibility and robustness measures are used to calculate the performance of the proposed approach.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125756687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Prakash, Harshit Agarwal, Urvi Agarwal, Prantik Biswas, Suma Dawn Jaypee
{"title":"Discovering Motifs in DNA Sequences: A Suffix Tree Based Approach","authors":"S. Prakash, Harshit Agarwal, Urvi Agarwal, Prantik Biswas, Suma Dawn Jaypee","doi":"10.1109/IADCC.2018.8692107","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692107","url":null,"abstract":"Motif discovery also known as motif finding is a challenging problem in the field of bioinformatics that deals with various computational and statistical techniques to identify short patterns, often referred to as motifs that corresponds to the binding sites in the DNA sequence for transcription factors. Owing to the recent growth of bioinformatics, a good number of algorithms have come into limelight. This paper proposes a competent algorithm that extracts binding sites in set of DNA sequences for transcription factors, using successive iterations on the sequences provided. The motif we work on are of unknown length, un-gapped and non-mutated. The algorithm uses suffix trie for finding such sites. In this approach the first sequence is used as base for constructing the suffix trie and is mapped with other sequences which results in extraction of the motif. Additionally, this algorithm can also be applied to related problems in the field of data mining, pattern detection, etc.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"35 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113936887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Trisha Singhal, Akshat Khare, Nikhil Gupta, T. Gandhi
{"title":"3D-Printed Sole with Variable Density using Foot Plantar Pressure Measurements","authors":"Trisha Singhal, Akshat Khare, Nikhil Gupta, T. Gandhi","doi":"10.1109/IADCC.2018.8691943","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8691943","url":null,"abstract":"With the increasing applications of 3D printing, podiatric research has received considerable attention from researchers worldwide. 3D-printed customized soles came into use to mitigate a patient foot’s pain and ameliorate comfortability. The presented work is aimed to provide customized foot sole with variable infills and appropriate depths in order to get the adequate pressure and comfort on the precise nerve areas, which are the origins of pain.In the proposed work, a 3D-sole is reconstructed conceptualizing variable infill density and appropriate depth fitting using foot plantar pressure measurements. The given work comprised of four phases: attaining foot plantar pressure readings, data processing, infill density distribution and 3D printing of the sole. Initially, the foot plantar data is obtained by a platform using an array of 32 X 32 piezo-electric sensors. Secondly, the input data is corrected with the removal of the rigid pattern from the foot sole via median filtering and interpolated via bicubic interpolation to obtain the smooth surface. Thereafter, modifiers are created to dispense different densities to distinct portions of the model. At last, the model is 3D-printed using fused deposition modeling (FDM) technology. The novel work can be extremely considerable in various medical and commercial applications.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125759875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}