{"title":"ECG Steganography to secure patient data in an E-Healthcare System","authors":"Dolly Meghani, S. Geetha","doi":"10.1145/2909067.2909078","DOIUrl":"https://doi.org/10.1145/2909067.2909078","url":null,"abstract":"E-healthcare systems are rapidly gaining importance with the evolution of remote monitoring devices for patient diagnosis. While transmitting patient classified information, it is essential to ensure that patient confidentiality is maintained. ECG signals are used as a medium to mask the patient's confidential data. ECG steganography is achieved by using Discrete Wavelet Transform along with Singular Value Decomposition. To assure that minimal distortion is reported after embedding the data, two distortion metrics namely, Percentage Residual Difference and Bit Error Rate are used. The proposal is implemented on MIT-BIH database and it has been observed that the proposed approach offers minimum distortion hence retaining the authenticity of the original signal.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126943522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical Trends and Practices of Web Intelligence","authors":"B. Malathi, K. C. Sekharaiah, H. Jayasree","doi":"10.1145/2909067.2909090","DOIUrl":"https://doi.org/10.1145/2909067.2909090","url":null,"abstract":"The web has undergone major transformation during last few years and revolutionized the world we live in. The amount of information and user-generated data on the web is increasing day by day. The major challenge of web research and development is in the effective usage of available data and information on web. Intelligence can be achieved by training the web to learn its content, structure (semantics of web) and by applying intelligent techniques to effectively access the web resources. In this context, Web Intelligence has been recognized as one of the most important as well as the fastest growing research field. This paper provides an overview on the trends and practices of Web Intelligence (WI) that play vital role in meeting the challenges of developing the intelligent web. We also introduce an analysis report on representative references in which the techniques and analytical methods are briefly described.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116065364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Accuracy for Intrusion Detection through Layered Approach Using Support Vector Machine with Feature Reduction","authors":"A. Nema, B. Tiwari, V. Tiwari","doi":"10.1145/2909067.2909100","DOIUrl":"https://doi.org/10.1145/2909067.2909100","url":null,"abstract":"Digital information security is the field of information technology which deal with all about identification and protection of information. Whereas, identification of the threat of any Intrusion Detection System (IDS) in the most challenging phase. Threat detection become most promising because rest of the IDS system phase depends on the solely on \"what is identified\". In this view, a multilayered framework has been discussed which handles the underlying features for the identification of various attack (DoS, R2L, U2R, Probe). The experiments validates the use SVM with genetic approach is efficient.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133778257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Techniques and Approaches for Disease Outbreak Prediction: A Survey","authors":"A. Bharambe, D. Kalbande","doi":"10.1145/2909067.2909085","DOIUrl":"https://doi.org/10.1145/2909067.2909085","url":null,"abstract":"As on today, due to rise in pollution and dense population in India, there has been an increase in health related issues with respect to spreading disease. The recent outbreak of diseases like HINI, dengue, malaria etc. have made people to focus on ways to minimize the effect of infectious disease. This can be achieved if early prediction and detection of such diseases are possible. Research is being carried out in building various prediction models to forecast the outbreak of such epidemics. While the traditional techniques were useful in giving the results, inputs from social media enabled us to detect the presence, prevalence and spread of these disease in a much early manner. Social networking Medias and their blogs have also been used for prediction. To handle such variety and size of data, it is required to design a system using big data approach for forecasting. Big Data is one of the need of the hour area of research that is become increasingly popular in prediction. This paper focuses on the survey carried out on available techniques and presents a unified approach to prepare a conceptual forecasting model.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125202211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gesture Recognition for VW & VO: Virtual Writing and Virtual Operation","authors":"A. Dubey, Khushbu Gulabani","doi":"10.1145/2909067.2909088","DOIUrl":"https://doi.org/10.1145/2909067.2909088","url":null,"abstract":"Modern era of research is motivated to optimize the hardware parts involved during the process of interaction. The idea is to deploy virtual environment for performing the daily routine tasks and social aspects of people. Virtualization provides the interface for performing the task and there is no need of hardware device space. Due to limited hardware space and human err, researchers emphasize use of virtual environment in computer human interaction. Mostly users prefer hand for giving the input task to the system and they are bounded to directly interact with system. Virtual writing and virtual operation is the ongoing research problem, where industries and laboratory are investing maximum effort. The developed gestured system has a lot of scope for improvements with research gazing at accuracy of recognition. In this paper author give the valuable contribution into gestured recognition. Two threads of gestured characteristics are considered for social application to improve the collaborative interaction of human to system.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Machine Learning Algorithms in R software for Diagnosis of ESD Diseases","authors":"S. Kolkur, D. Kalbande","doi":"10.1145/2909067.2909101","DOIUrl":"https://doi.org/10.1145/2909067.2909101","url":null,"abstract":"ESD is an acronym for Erythemato-Squamous Diseases, which is a set of six skin diseases [6]. The Erythemato-Squamous Diseases (ESDs) require huge computational efforts to predict the diseases because all the six diseases studied in this group have more than 90% common features.\u0000 The main focus of this paper is to study the use of machine learning algorithms in R software for prediction of ESD Diseases. In this paper, different algorithms are studied and implemented in R. Accuracy of these algorithms is compared.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach Used In Wireless Network to Detect Denial of Service Attack","authors":"Rashi Dhagat, P. Jagtap","doi":"10.1145/2909067.2909069","DOIUrl":"https://doi.org/10.1145/2909067.2909069","url":null,"abstract":"The shared behavior of wireless network makes it more vulnerable to Denial of Service attack. A Denial of Service (DOS) attack is a planned attempt to make resources unable to the legitimate client. These attacks can easily launch by perpetrator emitting no. of signals that do not follow MAC protocol. A DOS attacks are the significant cause of data corruption and malfunctioning of a wireless network. In this paper, we proposed a new approach to detect denial of service attack in wireless, which not only detect attack, but also differentiate it from the natural condition occur in a network. The proposed method uses different network factor and statistical method to calculate threshold value.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124421662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Narrow Band LNA Design Using OGMOSFET for Noise and Gain Analysis","authors":"G. Phade, Sandhya Save, Vivek Ratnapakhari","doi":"10.1145/2909067.2909084","DOIUrl":"https://doi.org/10.1145/2909067.2909084","url":null,"abstract":"LNA is the first building block of any receiver circuit. In this paper, a narrow band LNA operating at 2.4 GHz is designed in ADS CAD tool. Device used for LNA design is Optically Gated MOSFET (OGMOSFET). For DC bias, gate voltage is 1.5 V and drain voltage is 2V. Gain and noise analysis of the amplifier is carried out under dark and illumination. It is observed that noise is lowered and gain is improved under illumination as that of dark which are expected characteristics of any LNA.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115331142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Kerberos using DES Algorithm","authors":"Shikha Jindal, Manmohan Sharma","doi":"10.1145/2909067.2909083","DOIUrl":"https://doi.org/10.1145/2909067.2909083","url":null,"abstract":"Security is playing a very important and crucial role in the field of network communication system and Internet. Kerberos Authentication Protocol is designed and developed by Massachusetts Institute of Technology (MIT) and it provides authentication by encrypting information and allow clients to access servers in a secure manner. This paper describes the design and implementation of Kerberos using Data Encryption Standard (DES). Data encryption standard (DES) is a private key cryptography system that provides the security in the communication system. Java Development Tool Kit as the front end and ms access as the back end are used for implementation.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123390951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Bus stand Monitoring and Control","authors":"Shital M. Dharrao, Vijay D. Choudhary, K. Rane","doi":"10.1145/2909067.2909072","DOIUrl":"https://doi.org/10.1145/2909067.2909072","url":null,"abstract":"This paper summarizes work on the designing and application of GPS (Global positioning system) based technology clubbed with GSM (Global system for mobile communication) for Bus stand monitoring & control provided for public transportation. This system has been categorized into two modules: 'In-Bus module, Bus-stand module. The control panel at the bus side will give information to the drivers regarding Platform availability,(vacant or un-vacant platform) if the platform is vacant for the same Bus then it will directly go to platform after that Bus travelling schedule will be display on display board. If the actual platform allotted for parking is not vacant then the driver will get information regarding the alternative platform or waiting for platform availability rather than disturbing the actual Bus stand schedule. The drivers will get information of Platform through messages on parity basis so as to reduce the transit time and congestion. The GSM clubbed GPS technology can also be used to get the current location of vehicles and the available seats in it. ARM7 LPC2148 microcontroller is the main controlling device which controls and synchronizes all the operations by receiving the data GSM Module as well as GPS. Such kind of monitoring systems can be used for various public vehicles ranging from auto rickshaws to Buses. Such types of system will assist the travellers, drivers and the Bus stand controller at the control terminals for real time monitoring of the vehicles.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128852657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}