G. L. K. Reddy, M. Sabarimalai Manikandan, N. V. L. N. Murty
{"title":"Integrated Data Compression and Pulse Rate Extraction Scheme Using Differential Coding for Wireless PPG Monitoring Devices","authors":"G. L. K. Reddy, M. Sabarimalai Manikandan, N. V. L. N. Murty","doi":"10.1109/ICIINFS.2018.8721314","DOIUrl":"https://doi.org/10.1109/ICIINFS.2018.8721314","url":null,"abstract":"This paper presents a novel integrated data compression and pulse rate measurement scheme for power reduction in Internet-of-Things (IoT) enabled wireless PPG monitoring devices. In the proposed scheme, the recorded photoplethysmograph (PPG) signal is compressed using the differential pulse code modulation and Huffman coding techniques and then the pulse rate (PR) is simultaneously extracted from the differential signal, which is the difference between the original and predicted signals. The proposed scheme achieves an average compression ratio, percentage root-mean-squared difference (PRD), signal-to-noise ratio (SNR), and normalized cross correlation (NCC) of 4.76, 0.19%, 27.90 dB and 0.9991 respectively for the 5 s PPG signals digitized with a sampling rate of 100 Hz and resolution of 12 bits, on the three standard PPG databases (MIT-BIH SLP, MIMIC-II and CSL). Evaluation results show that the method yields peak detection rates of 98.94% and average PR measurement error of 0–2.6 samples. The proposed integrated scheme can enable timely measurement of the pulse rate (PR) and to significantly reduce the overall power consumption and therefore it is highly suited for IoT wireless wearable PPG sensors.","PeriodicalId":397083,"journal":{"name":"2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124384468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SentiCon: A Concept Based Feature Set For Sentiment Analysis","authors":"Satanik Mitra, M. Jenamani","doi":"10.1109/ICIINFS.2018.8721408","DOIUrl":"https://doi.org/10.1109/ICIINFS.2018.8721408","url":null,"abstract":"Selection and extraction of appropriate numerical features to do sentiment analysis on text data with greater accuracy remain an open problem. In supervised machine learning based sentiment analysis, Term Frequency- Inverse Document Frequency (TF-IDF) scores are used as a feature for classifying polarity of text data. TF-IDF features are a high dimensional representation of the importance of a word in the document. TF-IDF features are sparse and do not consider the correlation among the words which constructs the latent concepts in the document. Latent Semantic Analysis (LSA) removes sparseness of the TF-IDF features by representing it in a low dimensional matrix and extracts those hidden concepts. On the other hand, a natural property of text document is its information content. The quantitative estimation of Parts-of-Speech tags, negation words, sentiment lexicons etc. represent the quality of information shared in a text data. In this work, we propose an approach to generate a concept based domain specific feature set SentiCon by consolidating LSA with the quality of information of the corpus. We have applied Singular Value Decomposition (SVD) on TF-IDF features to find the LSA. We have tested SentiCon with two benchmark datasets IMDB movie review and Epinion Cars, Books datasets using four well-known classifiers - Decision Tree, Random Forrest, Support Vector Machine, and K-Nearest Neighbour classifiers. We have used standard performance measures precision, recall and F-measure to analyze the results.","PeriodicalId":397083,"journal":{"name":"2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127409964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secrecy Outage Probability for MRC Receiver in Presence of Multiple Antenna Eavesdropper","authors":"B. Kumbhani, H. Sharma","doi":"10.1109/ICIINFS.2018.8721395","DOIUrl":"https://doi.org/10.1109/ICIINFS.2018.8721395","url":null,"abstract":"In this paper, we consider a hybrid fading model in which line of sight (LOS) component is available between the transmitter and legitimate receiver and assume that eavesdropper is not in LOS from the transmitter. We analyze probability of existence of secrecy and secrecy outage probability for the case that the channels to the legitimate receiver are $kappa -mu $ faded and the channels to eavesdropper are Rayleigh faded. We present closed form expressions for existence of secrecy and a lower bound on secrecy outage probability when legitimate receiver and eavesdropper uses maximal ratio combining (MRC) diversity scheme to improve their performances in fading conditions. Results of analytical expressions are verified by an agreement of the results from simulation. Finally, it is concluded that the presence of LOS component improves secrecy of the system and stronger LOS component betters the secrecy.","PeriodicalId":397083,"journal":{"name":"2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129071836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spherical Directional Feature Extraction with Artificial Neural Networkfor Diabetic Retinopathy Classiftcation","authors":"S. Randive, R. K. Senapati, N. Bhosle","doi":"10.1109/ICIINFS.2018.8721392","DOIUrl":"https://doi.org/10.1109/ICIINFS.2018.8721392","url":null,"abstract":"Since last two decades one of the fast advancing and most sensitive research area is observed to be detection of diabetic retinopathy (DR). In fundus images detection of retinal lesions depends on grading of diabetic retinopathy and computer-aided screening which led to development of automatic telemedicine system. The detection accuracy is still a matter of concern even after existence of huge contribution in area of detection. The existing algorithm for classification of DR images is not able to encode the directional information in 2D and 3D plane. The proposed approach encodes in four different directions (0°, 45°, 90° and 135°) from the reference pixel to its surrounding pixel in 3D plane. The proposed model includes preprocessing, feature extraction using spherical directional local ternary pattern (SDLTP) and classification using traditional distance measure and learning based distance measure using artificial neural network (ANN). SDLTP is used for extracting the directional feature in 3D plane and to reduce the feature vector length, a principle component analysis (PCA) technique is adopted. Further, two techniques are used for classification purpose (distance measure and ANN). The proposed method classification accuracy is measured in terms of precision. From experimental analysis, the proposed method give significant improvement in classification accuracy in both unsupervised and supervised domain because feature extraction in implemented considering the directional information.","PeriodicalId":397083,"journal":{"name":"2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116983161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Kumar, S. P. Srivastava, R. Anand, P. Arvind, Shivain Bhardwaj, Ankit Thakur
{"title":"GLCM and ANN based Approach for Classification of Radiographics Weld Images","authors":"J. Kumar, S. P. Srivastava, R. Anand, P. Arvind, Shivain Bhardwaj, Ankit Thakur","doi":"10.1109/ICIINFS.2018.8721421","DOIUrl":"https://doi.org/10.1109/ICIINFS.2018.8721421","url":null,"abstract":"The process of welding involves welding defects. Welded material should be inspected accurately in order to ensure the quality of the design and operation. Non – Destructive Inspection is one of the important aspects which is responsible for identifying the flaw defect. An attempt has been made in the present work to accurately identify and classify the weld defects. A database of 79 images with 08 defects have been collected from Department of Mechanical and Industrial Engineering, Indian Institute of Technology Roorkee. The image database has been pre-processed and the features have been extracted by GLCM and feed to Artificial neural network for classification. Both 08 and 64 level features have been extracted by GLCM and fed to neural network. The features have been fed to both Feed Forward and Cascade Forward neural network for classification. Even though the quality of image database is not good, classification accuracy of 88.6% is obtained.","PeriodicalId":397083,"journal":{"name":"2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123899796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Coding Based Multiple Fault Tolerance Scheme in P2P Cloud Storage System","authors":"N. Arya, R. R. Rout, G. Lingam","doi":"10.1109/ICIINFS.2018.8721316","DOIUrl":"https://doi.org/10.1109/ICIINFS.2018.8721316","url":null,"abstract":"Cloud storage systems are designed to provide reliable storage services and reduce the cost by utilizing the storage space efficiently. However, cloud storage systems suffer from loss of data whenever an unexpected failure occurs. This work focuses on providing network coding benefits in robust cloud storage system. We design a system model for multiple-cloud storage and multiple node failures. Further, the storage system provides authentication for users and minimizes the update operation. We have carried out our work considering trade-off between repair bandwidth and cloud storage capacity and comparing with RAID-6. The proposed approach provides protection (fault tolerance) against unexpected failure using erasure and regenerating codes.","PeriodicalId":397083,"journal":{"name":"2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124000280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Over-current Protection Algorithm for a Microgrid","authors":"Mandeep Singh, A. V. Ravi Teja","doi":"10.1109/ICIINFS.2018.8721367","DOIUrl":"https://doi.org/10.1109/ICIINFS.2018.8721367","url":null,"abstract":"In this paper, a modified protection scheme is proposed for connecting distributed generation to the utility grid. This is based on Adaptive Overcurrent Protection (AOP) scheme proposed in literature but is modified to suit all the possible needs of a microgrid. The main objective of this algorithm is to protect the entire system (including distributed generation) without modifying the existing protection scheme of the main grid. The algorithm is developed based on the data collected by the Microgrid Central Controller (MCC) from the relays. The proposed scheme is tested taking into consideration all possible scenarios of operation as well as faults that can occur in the microgrid.","PeriodicalId":397083,"journal":{"name":"2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121167522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference Aware Resource Allocation (IARA) in Cognitive Radio Networks","authors":"M. Pavan, Sushil Kumar, Gajendra Nayak","doi":"10.1109/ICIINFS.2018.8721375","DOIUrl":"https://doi.org/10.1109/ICIINFS.2018.8721375","url":null,"abstract":"Cognitive radio is treated as an leading edge technology to overcome the problem of spectrum under utilization. It pro-videos a way for dynamic allocation of spectrum among licensed and unlicensed users. In this work, Firstly a metric namely Interference ratio is considered and the Markov model is used to compute the probability of Interference ratio at a particular time instant t. A new Metric named Expected Interference Ratio (EIR) is defined and calculated with the help of interference ratio and probability. An algorithm for channel allocation among unlicensed users has been designed and developed. On the basis of the simulation result and analysis, it is revealed that the designed EIR based technique provides 10% improvement in spectrum utilization as compared to Interference based allocation technique.","PeriodicalId":397083,"journal":{"name":"2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114517242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DNN based Acoustic Scene Classification using Score Fusion of MFCC and Inverse MFCC","authors":"Chandrasekhar Paseddula, S. Gangashetty","doi":"10.1109/ICIINFS.2018.8721379","DOIUrl":"https://doi.org/10.1109/ICIINFS.2018.8721379","url":null,"abstract":"Herein, we propose an Acoustic Scene Classification (ASC) based on Deep Neural Networks (DNN). The design of Mel-filer bank helps in capturing the acoustic scene characteristics in the low-frequency regions during MFCC extraction. In this paper, inverse MFCC are used as interdependent to structure of Mel filter bank. We can effectively capture the acoustic information in the total audio frequency range using MFCC and IMFCC features. An experiment is carried on Tampere University of Technology (TUT) Acoustic Scenes 2017 Dataset. DNN architecture at utterance level classification with supervised learning is adopted. Scores from the DNN models corresponding to MFCC and IMFCC features are combined for testing the model. The relative improvement of 5.22% wih respect to baseline system is achieved by the proposed system on setup of 4-fold cross-validation. We participated in the DCASE 2017 challenge for ASC task, also got 45.9% accuracy on given evaluation dataset. This approach got 76th rank out of 97 submissions.","PeriodicalId":397083,"journal":{"name":"2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114237324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local pattern-based descriptors for iris recognition: A comparative analysis","authors":"Ritesh Vyas, T. Kanumuri, G. Sheoran, V. Kumari","doi":"10.1109/ICIINFS.2018.8721368","DOIUrl":"https://doi.org/10.1109/ICIINFS.2018.8721368","url":null,"abstract":"Human iris has found widespread utility in person authentication problems. Reason behind this is the availability of unique texture patterns present in the human eye. Given the success of local pattern-based descriptors in texture classification, this paper aims to bring together different descriptors, based on local neighborhood of a pixel in an image. A comprehensive comparative analysis of 11 different descriptors is provided in this paper. All descriptors are evaluated under the same experimental setup using the IITD iris database. A critical analysis is presented under both the verification and identification modes of the biometric recognition system.","PeriodicalId":397083,"journal":{"name":"2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126166929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}