{"title":"Classification of glaucoma based on texture features using neural networks","authors":"Deepti Yadav, M. P. Sarathi, Malay Kishore Dutta","doi":"10.1109/IC3.2014.6897157","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897157","url":null,"abstract":"Glaucoma is the most common cause of blindness and it affects most of the ageing society and this occurs due to pressure increases in the optic nerve which damages the optic nerve. This paper is an attempt to study and analyze the texture features of the Fundus image and its variations when the Fundus image is infected with glaucoma. The texture features extracted are localized around the optic cup which gives clear results for the purpose of distinct identification and classification. The classification method proposed is use of neural network classifier with the help of texture feature extraction of the localized area of the optic cup of the fundus images. The classification method gives high level of accuracy based on the different test-train ratios. The experimental results are encouraging indicating an accuracy of above 90% accuracy in classification.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130783449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-output radial basis function interpolation of saturated steam table for full scope simulator design","authors":"Shweta Khushu, F. Kazi","doi":"10.1109/IC3.2014.6897240","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897240","url":null,"abstract":"Full scope simulators in nuclear or fossil power plants rely heavily on steam tables since most of their equipment operate in the saturation pressure/temperature region. The process of simulating the behavior of such plants involves trade-off between simulation cycle time and the available memory space. It is difficult to store entire steam table in the memory as they may adversely affect the computation and space complexity. This paper presents a novel approach of interpolating the steam table by radial basis function network (RBFN) that overcomes the shortcomings of storing the entire table. The paper uses multi-output RBFN architecture. The paper further shows applicability of forward bulk orthogonal least squares (OLS) algorithm for optimum center selection of RBFN. Various radial basis functions are tested for the regression purpose and their corresponding mean square errors are compared with existing ANSI standard.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128122125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crowdlearning: An incentive-based learning platform for crowd","authors":"Nilesh Padhariya, Kshama Raichura","doi":"10.1109/IC3.2014.6897145","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897145","url":null,"abstract":"Crowdlearning is an incentive-based learning platform for crowd, denoted as iCL, to inspire experts for knowledge sharing and to incentivize them for their contributions in crowd. In iCL, collaborators provide learning platform to the crowd of interested learners. The relativeness of interest of contributors and learners is compared by match-making process. The core objective of iCL is to motivate learners to join common-interest crowd and to collaboratively perform Crowdlearning activities. Moreover, incentivization motivates learners to grow crowd. The main contributions of iCL are three-fold. First, it presents the architecture of iCL with the crowd formation process that includes the processes of initialization and collaboration. Second, it proposes three incentive-based fees distribution schemes defined as Equally Distributed Incentive (EDI), Level-based EDI (LEDI) and Commission-oriented LEDI (CLEDI). Third, our performance evaluation shows that our schemes are indeed effective to motivate learners for participation and to inspire experts for their contribution through incentivization in crowdlearning.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117276603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and trust- new challenges to computing today in cyberspace","authors":"T. Ramesh","doi":"10.1109/IC3.2014.6897138","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897138","url":null,"abstract":"Cyber security threats and issues are escalating in many facets of system domain applications. A comprehensive cyber security model is the need today for quick identification and analysis of various type of threats and attacks for developing a comprehensive mitigation plan. In recent years, hardware threat issues are drawing wide attention adding to the security problem in cyber space. TRUST which is beyond SECURITY is playing a major role. In this paper we present a short synopsis of cyber security and trust for computing today in cyber space that includes hardware security threats, trust and few mitigations.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116210380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. S. Kundu, O. Mazumder, Ritwik Chattaraj, S. Bhaumik
{"title":"Door negotiation of a omni robot platform using depth map based navigation in dynamic environment","authors":"A. S. Kundu, O. Mazumder, Ritwik Chattaraj, S. Bhaumik","doi":"10.1109/IC3.2014.6897169","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897169","url":null,"abstract":"Aim of this paper is to develop a holonomic omnidirectional drive system to detect and pass through a doorway using depth map based navigation using Kinect sensor in dynamic environment. Omni drive mechanism enables holonomic motion of the system which provides efficient movement in narrow space due to higher degree of maneuverability. Omni robot is controlled in manual mode by joystick and in autonomous mode, it localizes and navigates using an overhead mounted webcam and a special augmented reality based marker and Kinect based depth mapping. The proposed system is a prototype for a multimodal holonomic wheelchair. The system has potential application in the field of assistive device, rehabilitation robotics and in multipurpose robot navigation.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126077247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel Bayesian Belief Network structure learning algorithm based on bio-inspired monkey search meta heuristic","authors":"S. Mittal, K. Gopal, S. Maskara","doi":"10.1109/IC3.2014.6897163","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897163","url":null,"abstract":"Bayesian Belief Networks (BBN) combine available statistics and expert knowledge to provide a succinct representation of domain knowledge under uncertainty. Learning BBN structure from data is an NP hard problem due to enormity of search space. In recent past, heuristics based methods have simplified the search space to find optimal BBN structure (based on certain scores) in reasonable time. However, slow convergence and suboptimal solutions are common problems with these methods. In this paper, a novel searching algorithm based on bio-inspired monkey search meta-heuristic has been proposed. The jump, watch-jump and somersault sub processes are designed to give a global optimal solution with fast convergence. The proposed method, Monkey Search Structure Leaner (MS2L), is evaluated against five popular BBN structure learning approaches on model construction time and classification accuracy. The results obtained prove the superiority of our proposed algorithm on all metrics.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125166816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inverse study of double-glazed solar collector using hybrid evolutionary algorithm","authors":"R. Das","doi":"10.1109/IC3.2014.6897236","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897236","url":null,"abstract":"This paper presents an application of the hybrid evolutionary-nonlinear programming based optimization algorithm for solving an inverse problem of a double-glazed flat-plate solar collector. For a given configuration, the performance of the solar collector can be represented by heat loss factor. In this work, four parameters such as plate-inner glass spacing, inner-outer glass spacing, thickness of the glass cover and the emissivity of the absorber plate have been estimated by the hybrid algorithm for satisfying a given heating requirement in a double-glazed flat-plate solar collector. Hybrid algorithm is used to search different unknowns within a prescribed feasible range of various parameters. Many feasible and nearly unique combinations of the four unknowns are observed to satisfy the same heating requirement, which is confirmed by satisfactory reconstruction of the heat loss factor fields.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128360118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated spoken language recognition system using support vector machines","authors":"Garima Vyas, M. Dutta","doi":"10.1109/IC3.2014.6897156","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897156","url":null,"abstract":"An automatic Language Identification (LID) is a system designed to recognize a language from a given spoken utterance. The spoken utterances are classified according to the pre-defined set of languages. In this paper a LID system is designed for two different languages namely English and French. The classification of an audio sample is done by extracting Mel frequency cepstral coefficients (MFCCs) and putting them on support vector machines with radial basis function kernel. The proposed framework is speaker-independent. This scheme was tested on a database of multi-lingual speech samples. The language identification accuracy is found to be 92% for French and 88% for English.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akriti Saini, Nishank Bhatia, Bhavya Suri, Shikha Jain
{"title":"EmoXract: Domain independent emotion mining model for unstructured data","authors":"Akriti Saini, Nishank Bhatia, Bhavya Suri, Shikha Jain","doi":"10.1109/IC3.2014.6897154","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897154","url":null,"abstract":"Emotion plays an important role in human computer interaction to give a human like feel. To acknowledge the importance of emotions in an artificial agent, we propose a domain independent emotion mining model (EmoXract) which extracts emotions from an unstructured data. The emotion is extracted at sentence level based upon the contextual information. Basically, we have used two corpuses: WordNet dictionary and WordNet-Affect dictionary. WordNet dictionary is used for the creation of synonyms and stemmed words. WordNet-Affect dictionary is used to establish a weighted relationship between each word to every primary emotion. Various modules adopted in the model are converter, tokenizer, creating synsets and stemmed words, assigning weights, heuristics rules, calculating net weight and sentence level emotion extraction. We have also designed a self-learning dictionary which self-updates the new word, its synonym and stemmed words with the same weight in accordance to its already existing synonym. Finally the model is simulated for a test data of more than 500 sentences, selected from different domains to validate the proposed design.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133666290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel architecture for identity management system using virtual appliance technology","authors":"Parth Srivastava, S. Pande","doi":"10.1109/IC3.2014.6897168","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897168","url":null,"abstract":"Identity management system has gained significance for any organization today for not only storing details of its employees but securing its sensitive information and safely managing access to its resources. This system being an enterprise based application has time taking deployment process, involving many complex and error prone steps. Also being globally used, its continuous running on servers lead to large carbon emissions. This paper proposes a novel architecture that integrates the Identity management system together with virtual appliance technology to reduce the overall deployment time of the system. It provides an Identity management system as pre-installed, pre-configured and ready to go solution that can be easily deployed even by a common user. The proposed architecture is implemented and the results have shown that there is decrease in deployment time and decrease in number of steps required in previous architecture. The hardware required by the application is also reduced as its deployed on virtual machine monitor platform, which can be installed on already used servers. This contributes to the green computing practices and gives costs benefits for enterprises. Also there is ease of migration of system from one server to another and the enterprises which do not want to depend on third party cloud for security and cost reasons, can easily deploy their identity management system in their own premises.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132554103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}