{"title":"Severity Assessment of Lymph Nodes in CT Images using Deep Learning Paradigm","authors":"Hitesh Tekchandani, Shrish Verma","doi":"10.1109/ICCMC.2018.8487555","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487555","url":null,"abstract":"Cancer in lymph nodes occurs either in the nodes themselves or infuses from somewhere else. In these scenarios, the cancer assessment using image information may lead to valuable assistance to the radiologists. In this paper, the lymph nodes in computed tomography (CT) images are explored for assessing the severity of cancer on deep machine learning platform. The proposed system has an advantage of not working on features to achieve comparable or even better stratification of cancerous lymph nodes. Mediastinal lymph nodes are focused here due to their clinical importance to determine the metastasis.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"8 1","pages":"686-691"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75590701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nireekshith. Yarraguntla, N. Tirumala, S. Shameem, K. S. Rao
{"title":"Detection of Hepatitis viruses (HBV, HAV, HCV) in serum using MEMS based Bio-Sensor","authors":"Nireekshith. Yarraguntla, N. Tirumala, S. Shameem, K. S. Rao","doi":"10.1109/ICCMC.2018.8487679","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487679","url":null,"abstract":"A biosensor is a device that converts naturally occurring activity into measurable signal. Biosensors stands up for its special features such as miniaturization, easily usable, one-step reagent less analysis etc. that pave a separate way when compared to conventional biological sensing techniques. Most conventional MEMS and NEMS are designed for detecting and sensing. The working principle varies as per application, the nature of the analyte molecules, and the accuracy required. Sensing methods vary according to device such as piezo-resistance, capacitance, resonance etc. In this paper, we implement the structures using comsol software. This biosensor can detect Hepatitis viruses (HBV, HAV, HCV) by immobilizing specific antibodies on the sensing element of the sensor when the patient sample containing hepatitis viruses surface antibody (anti-HbsAg)is placed on the sensing part, Biochemical interactions take place between Hepatitis viruses antigens and the antibodies fixed on the surface of the sensing element. Due to this, beam structure changes so that disease can be detected.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"9 1","pages":"405-409"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83534050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Ravi, M. Naresh Babu, R. Sridevi, V. Kamakshi Prasad, A. Govardhan, Padma N Joshi
{"title":"Inspecting Access Controls in Cloud Based Web Application","authors":"N. Ravi, M. Naresh Babu, R. Sridevi, V. Kamakshi Prasad, A. Govardhan, Padma N Joshi","doi":"10.1109/ICCMC.2018.8487896","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487896","url":null,"abstract":"The scope of cloud based computing has been increased. In this research we have explored the access control mechanism in cloud computing along with web based applications. Security is considered as major challenge to cloud based application today. This paper focuses on access control mechanism along with existing security threats. The discussion has been made on some existing access control mechanism. Cloud based application & cloud services both need protection especially in case of ecommerce applications. There is an electronic wallet where fund of user is kept & he could make online transaction using it. Thus Access control is must to prevent unauthentic person to make unauthorized transaction.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"6 1","pages":"262-269"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85426736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Communication and Implementation Technique for Sybil Attack in Vehicular Ad-Hoc Networks","authors":"Mukesh Soni, Anuj K. Jain","doi":"10.1109/ICCMC.2018.8487887","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487887","url":null,"abstract":"Sybil attack is when one node gains identity of another node. This in one of the dangerous attacks that can give rise to other attacks also. Hence, we present first the implementation of the attack. Secondly, we present the communication and detection algorithm of the sybil attack. In the algorithm, we propose novel approach to solve the problem of communication and detection of sybil attack. Furthermore, we implemented the suggested mechanism to verify the results.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"2011 1","pages":"539-543"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86325930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A HEURISTIC APPROACH OF SORTING USING LINKED LIST","authors":"Shruti Pandey","doi":"10.1109/ICCMC.2018.8487780","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487780","url":null,"abstract":"Sorting given numbers means arranging the given numbers either in ascending order or descending order. There are various algorithms for sorting a set of numbers. These algorithms take different time to sort numbers. Sorting a given set of numbers is of prime importance. For this the time complexities of various sorting algorithms have been analyzed. Aiming at the shortcomings of various traditional algorithms and the array-indexed sorting algorithm for natural numbers, this algorithm has been developed. This new developed algorithm is based on linked list and removes the shortcomings of various sorting algorithms. Using linked list as a method of sorting has reduced the time of the algorithm.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"14 1","pages":"446-450"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79921411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naresh Babu Muppalaneni, C. Pavan, G. S. Nithin Chowdary, K. Sai Teja, Kamalapati Yugendhar
{"title":"Runtime Analysis on Open Source Technologies","authors":"Naresh Babu Muppalaneni, C. Pavan, G. S. Nithin Chowdary, K. Sai Teja, Kamalapati Yugendhar","doi":"10.1109/ICCMC.2018.8488033","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488033","url":null,"abstract":"Web applications play a crucial role for many organizations, there are many technologies available in the market and each technology has its own advantage, so choosing the best one is important factor. In this paper we have studied the performance analysis of two open source technologies for developing web applications namely PHP and JSP. A comparative analysis is performed on the two open source technologies on different platforms. The web applications we are considering for runtime analysis are files uploading (JPEG, Text, pptx, Word, Pdf files), Database operations, Algorithm processing.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"24 1","pages":"422-425"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89806174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fibonacci Series Based Transition Reduction Dynamic Sector CODEC Design","authors":"N. Chintaiah, G. Reddy","doi":"10.1109/ICCMC.2018.8487744","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487744","url":null,"abstract":"The process of data word transmission on an on-chip bus leads to switching activity of data bits on the bus wires, which charges and discharges the capacitance associated with the wires and consequently leads to dynamic power dissipation and delay increases. The amount of power dissipation at buses is significant compared to remaining circuit power dissipation. It is desirable to encode the values sent over these buses to decrease the switching activity and thereby reducing the bus power consumption and reducing the delay. In this paper, we present the input as Fibonacci sequence and partition the source word space into a number of sectors with a unique identifier. The combination of Fibonacci series and dynamic sector encoding technique (FS-DS) to reduce the number of transitions as well as to reduce the power dissipation and delay.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"16 6 1","pages":"596-600"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78469677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STORE WHEN BLOCKED AFTER FAIR PRIORITIZED PREEMPTION (SBFPP) PROTOCOL FOR NON BLOCKING OPTICAL BURST SWITCHED NETWORKS","authors":"J. Tripathi, R.K. Singh","doi":"10.1109/ICCMC.2018.8487484","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487484","url":null,"abstract":"Just Enough Time is the most promising protocol of optical burst switched network, Different prioritization on the basis of fairness algorithms have been given for increasing the utilization of link. Still there is probability of blocking in the network at high load. In this Paper we have proposed a none blocking Optical Burst Switched network by proposing a new protocol for optical Burst switched network. In this paper we have also compared the blocking probabilities of JET with some fairness protocols with our proposed protocol. A simulated output for effective bandwidth utilization and dropping probabilities of all the outputs are also presented and compared.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"101 1","pages":"220-224"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74453193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emotion Recognition System based on EEG signal: A Comparative Study of Different Features and Classifiers","authors":"M. K. Ahirwal, M. Kose","doi":"10.1109/ICCMC.2018.8488044","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488044","url":null,"abstract":"In this paper, emotion recognition system based on electroencephalogram (EEG) signals has been implemented. The new technology of emotion recognition using physiological signal is based on pattern recognition and classification problem that is well described in this paper. A very famous dataset of EEG signals for emotion recognition known as DEAP dataset is used and three categories of features, time domain features, frequency domain features and entropy based features has been extracted. Classification through support vector machine (SVM), artificial neural networks (ANN) and Naïve bayes (NB) has been done. Performance of system is observed by the parameters like, classification accuracy, precision and recall. After performance observation, it is found that ANN gives the best performance with all types of features. Highest classification accuracy achieved by ANN for said dataset, entropy based features and implementation is 93.75 percent.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"28 1","pages":"472-476"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74189214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometrics Secured Voting System with Finger Print, Face and Iris Verification","authors":"N. Kavitha.S., Shahila, Prasanna Kumar","doi":"10.1109/ICCMC.2018.8487558","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487558","url":null,"abstract":"Election has a great effect on the minds of People. It is one of the significant features of our country India. In order to have an impartial elections world is conducting experiments with different technologies .Main objective is designing a Voting system model where it supports impartial Elections. In this project, Aadhar Card, Finger Print and Iris of the voter is verified before allowing him to cast the vote thus providing Secured Biometrics Voting System.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"168 1","pages":"743-746"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85585537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}