{"title":"Detection of Glaucoma in Retinal Fundus Images Using Fast Fuzzy C means clustering approach","authors":"Law Kumar Singh, Pooja, H. Garg","doi":"10.1109/ICCCIS48478.2019.8974539","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974539","url":null,"abstract":"Glaucoma is one of the major causes of vision loss in today’s world. Glaucoma is the disease where fluid pressure in the eye increases; if it is not timely cured, the patient may lose their vision. Glaucoma can be detected by examining boundary of optics cup and optics disc acquired from retinal fundus images. The proposed method suggests automatic detection the boundary of optics cup and optics disc with processing of fundus images. This paper explores the new approach of fast fuzzy C-mean technique for segmenting the optic disc and optic cup in fundus images. Results evaluated by fast fuzzy C mean a technique is faster than fuzzy C-mean method. The proposed method reported results to 97.75% 92.50% and 95.00% when tested on DRIONS, DRIVE and STARE on publicly available databases of retinal fundus images.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134061828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maliha Khan, Sudeshna Chakraborty, Rani Astya, Shaveta Khepra
{"title":"Face Detection and Recognition Using OpenCV","authors":"Maliha Khan, Sudeshna Chakraborty, Rani Astya, Shaveta Khepra","doi":"10.1109/ICCCIS48478.2019.8974493","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974493","url":null,"abstract":"Face detection and picture or video recognition is a popular subject of research on biometrics. Face recognition in a real-time setting has an exciting area and a rapidly growing challenge. Framework for the use of face recognition application authentication. This proposes the PCA (Principal Component Analysis) facial recognition system. The key component analysis (PCA) is a statistical method under the broad heading of factor analysis. The aim of the PCA is to reduce the large amount of data storage to the size of the feature space that is required to represent the data economically. The wide 1-D pixel vector made of the 2-D face picture in compact main elements of the space function is designed for facial recognition by the PCA. This is called a projection of self-space. The proper space is determined with the identification of the covariance matrix’s own vectors, which are centered on a collection of fingerprint images. I build a camera-based real-time face recognition system and set an algorithm by developing programming on OpenCV, Haar Cascade, Eigenface, Fisher Face, LBPH, and Python.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wep, Wap and Wap2 Wireless Network Security Protocol: A Compact Algorithm : (Wireless Network Security Protocol)","authors":"Abhishek Badholia, Vijayant Verma, S. Kashyap","doi":"10.1109/ICCCIS48478.2019.8974517","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974517","url":null,"abstract":"The modern communication lies with the Wireless Network Systems (WNS). This paper studies the three popular WNS protocols i.e. WEP, WAP and WAP2. The improved version of WEP, WAP and WAP2 is presented in this paper. The proposed algorithm performs better than the existed. The new WEP, WAP and WAP2 are based on the algebraic, statistics and logarithmic methods. Thus the improved WEP, WAP and WAP2 perform better as per the standards of security and efficiency.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114816557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key enablers influencing the realization of green corridor for the Emergency Vehicles in India using ISM approach","authors":"Zaheeruddin, Hina Gupta","doi":"10.1109/ICCCIS48478.2019.8974516","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974516","url":null,"abstract":"The sustainable development of traffic conditions in the urban area is hindered by the improper management of traffic. The characteristics of traffic congestion in the Urban areas vary under the influence of different conditions, such as different day and time of week, count of vehicles on road, causality on road and the parking of vehicles etc. It is necessary to set up the relationships between traffic congestion patterns and those influencing factors, when we conduct macroscopic analysis on the causes of traffic congestion. The bottleneck situation arising out of congestion has made the commuting of Emergency Vehicles(EV) a tedious and tough job. The rationale of this work is to pay heed to the way the Emergency Vehicles commute in order to decline their travel time and provide a clear path. The paper probes into several key issues or key enablers that need to be managed properly in order to have an organised traffic. The work has been carried out on the basis of the previous studies and the discernment of the proficient involved in management of traffic. In this work, a technique named, Interpretive Structure Modelling(ISM) has been employed, for comprehending the hierarchical and contextual affiliation structure amongst the various key enablers.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117197343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rana, Ayodeji Olalekan Salau, Swati Gupta, S. Arora
{"title":"Machine learning methods for IoT and their Future Applications","authors":"A. Rana, Ayodeji Olalekan Salau, Swati Gupta, S. Arora","doi":"10.1109/ICCCIS48478.2019.8974551","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974551","url":null,"abstract":"With the advent of rapid developments, large number of heterogeneous devices is able to connect with the help of IOT technology. Although IOT possess very complex architecture because of connectivity of variety of devices and services in the system. In this paper, a brief concept of urban IOT system is presented which are designed to support smart city and advanced communication technologies. Hence a comprehensive survey of architecture, technologies, and computational frameworks is provided for a smart IOT. It also discusses the major vulnerabilities and challenges faced by IOT and also present how machine learning is applied to IOT. Hence smart city is considered as the use case and it explains how various techniques are applied to data in order to extract great results with good efficiency.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"2001 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131797195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimodal Biometric System using Grasshopper Optimization","authors":"Keshav Gupta, G. S. Walia, K. Sharma","doi":"10.1109/ICCCIS48478.2019.8974504","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974504","url":null,"abstract":"Biometric systems are need of the day because of their various advantages over traditional authentication systems. Multimodal Biometric systems combine information from multiple sources to reach a final decision. Score level fusion combines outcomes of individual classffiers to make a final decision. However, most of the biometric systems suffer from the issue of score confliction of individual classifiers. To resolve this issue, we have proposed a novel optimized score level fusion using Grasshopper optimization where the performance optimization of individual classffiers is performed and a concurrent solution is achieved by means of proportional conflict redistribution rules. The system does not require any classifier training and exhibits high performance. The proposed system is robust against the dynamic environment and exhibits high reliability.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126219878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomic Resource Allocation Frameworks for Service-based Cloud Applications: A Survey","authors":"Reena Panwar, S. M.","doi":"10.1109/ICCCIS48478.2019.8974463","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974463","url":null,"abstract":"Cloud is a collection of heterogeneouscomputing resources that are presented to the users on the payment basis. Cloud and the associated resources are dynamic in nature. The provisioning of resources in such dynamic environment is one of the critical issues in the cloud. Various Quality of Service (QoS) parameters contribute to the provisioning of appropriate resources in the cloud. A right proportion of resource provisioning is necessary to improve the performance of the system. To mention, energy wastage and cost increase due to over-provisioning, while, under-provisioning may seem to effect Service Level Agreements (SLA) and Service Quality (QoS). Hence, the virtual resources should be allocated accordingly to fulfil the current dynamic demand of various applications. This paper presents a deeper survey on the various resource allocation frameworks for service-based cloud applications.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129180603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based Security Solutions to Preserve Data Privacy And Integrity","authors":"Dev Arora, S. Gautham, H. Gupta, B. Bhushan","doi":"10.1109/ICCCIS48478.2019.8974503","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974503","url":null,"abstract":"The emerging blockchain technology helps in the decentralization of transactions, where every participant network verifies and validates the transaction making it immutable. With the rapid expansion of the technology, transactional data which is stored and validated is also increasing. The blockchain technology came into prominence largely due to the bitcoin and the security aspects of the technology. This technology is comparatively fast, secure and efficient. This paper discusses the generalized overview, different algorithms to reach consensus, system workflows and various security aspects of handling, transacting and storing data. This paper also throws light Smart Contracts and their applications.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127308232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hyperspectral Data Analysis for Arid Vegetation Species : Smart & Sustainable Growth","authors":"S. Borana, S. K. Yadav, S. Parihar","doi":"10.1109/ICCCIS48478.2019.8974502","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974502","url":null,"abstract":"Hyperspectral Images are continuous narrow spectral bands provides a wealth of information which can be used in different applications. Advance developments in hyperspectral remote sensing technology since two decade have opened new opportunity to explore innovative ways to study vegetation species. In this research work, ground-based AISA Vis-NIR hyper spectral image system of 240 bands, wavelength range from 390 to 960 nm with 2.5 nm spectral resolution and 1cm spatial resolution at a distance of 10m was used for classification of prominent vegetation species (Cactus, Neem and Babool). Machine learning supervised classification algorithms are used to classifying the Hyperspectral data. In supervised classification, four methods have been used viz. Spectral Angle Mapper (SAM), Minimum Distance (MD), Support Vector Machine (SVM) and Spectral Information Divergence (SID) Classifier. Environment of Visualize Images (ENVI) software is used for processing and analysis of hyperspectral images for classification of vegetation species in Jodhpur study area. Accuracy assessments were also carried out for classified output images and estimate the performance of a classifier. The overall accuracy for SVM classification algorithm is best (81.2%) when 237 hyperspectral bands were used and SAM classification algorithm has provided a better overall accuracy (76.6%) when maximum noise function (MNF) 11 bands were used. This research demonstrated the efficient use of contiguous fine bands of Hyperspectral data in discrimination and classification of vegetation species.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126079215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low Voltage Current Mode Instrumentation Amplifier","authors":"D. Agrawal, S. Maheshwari","doi":"10.1109/ICCCIS48478.2019.8974467","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974467","url":null,"abstract":"This paper present a Current Mode Instrumentation Amplifier (CMIA) that employs a low voltage Extra-X Current Conveyor (EX-CCII), operable at ±0.75V. The proposed circuit utilizes one EX-CCII, and a grounded resistor. The circuit provides the low input impedance of 105 Ω and high output impedance of 0.31 MΩ which is favourable for the cascading without additional buffers. The non-ideal and parasitic effects on the circuit performance are being carried out. The theoretical predictions are well supported through verification results by using the PSPICE program.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115017482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}