2018 Second International Conference on Computing Methodologies and Communication (ICCMC)最新文献

筛选
英文 中文
Severity Assessment of Lymph Nodes in CT Images using Deep Learning Paradigm 基于深度学习范式的CT图像淋巴结严重程度评估
Hitesh Tekchandani, Shrish Verma
{"title":"Severity Assessment of Lymph Nodes in CT Images using Deep Learning Paradigm","authors":"Hitesh Tekchandani, Shrish Verma","doi":"10.1109/ICCMC.2018.8487555","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487555","url":null,"abstract":"Cancer in lymph nodes occurs either in the nodes themselves or infuses from somewhere else. In these scenarios, the cancer assessment using image information may lead to valuable assistance to the radiologists. In this paper, the lymph nodes in computed tomography (CT) images are explored for assessing the severity of cancer on deep machine learning platform. The proposed system has an advantage of not working on features to achieve comparable or even better stratification of cancerous lymph nodes. Mediastinal lymph nodes are focused here due to their clinical importance to determine the metastasis.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"8 1","pages":"686-691"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75590701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detection of Hepatitis viruses (HBV, HAV, HCV) in serum using MEMS based Bio-Sensor 基于MEMS的生物传感器检测血清中肝炎病毒(HBV, HAV, HCV
Nireekshith. Yarraguntla, N. Tirumala, S. Shameem, K. S. Rao
{"title":"Detection of Hepatitis viruses (HBV, HAV, HCV) in serum using MEMS based Bio-Sensor","authors":"Nireekshith. Yarraguntla, N. Tirumala, S. Shameem, K. S. Rao","doi":"10.1109/ICCMC.2018.8487679","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487679","url":null,"abstract":"A biosensor is a device that converts naturally occurring activity into measurable signal. Biosensors stands up for its special features such as miniaturization, easily usable, one-step reagent less analysis etc. that pave a separate way when compared to conventional biological sensing techniques. Most conventional MEMS and NEMS are designed for detecting and sensing. The working principle varies as per application, the nature of the analyte molecules, and the accuracy required. Sensing methods vary according to device such as piezo-resistance, capacitance, resonance etc. In this paper, we implement the structures using comsol software. This biosensor can detect Hepatitis viruses (HBV, HAV, HCV) by immobilizing specific antibodies on the sensing element of the sensor when the patient sample containing hepatitis viruses surface antibody (anti-HbsAg)is placed on the sensing part, Biochemical interactions take place between Hepatitis viruses antigens and the antibodies fixed on the surface of the sensing element. Due to this, beam structure changes so that disease can be detected.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"9 1","pages":"405-409"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83534050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Inspecting Access Controls in Cloud Based Web Application 基于云的Web应用访问控制检测
N. Ravi, M. Naresh Babu, R. Sridevi, V. Kamakshi Prasad, A. Govardhan, Padma N Joshi
{"title":"Inspecting Access Controls in Cloud Based Web Application","authors":"N. Ravi, M. Naresh Babu, R. Sridevi, V. Kamakshi Prasad, A. Govardhan, Padma N Joshi","doi":"10.1109/ICCMC.2018.8487896","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487896","url":null,"abstract":"The scope of cloud based computing has been increased. In this research we have explored the access control mechanism in cloud computing along with web based applications. Security is considered as major challenge to cloud based application today. This paper focuses on access control mechanism along with existing security threats. The discussion has been made on some existing access control mechanism. Cloud based application & cloud services both need protection especially in case of ecommerce applications. There is an electronic wallet where fund of user is kept & he could make online transaction using it. Thus Access control is must to prevent unauthentic person to make unauthorized transaction.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"6 1","pages":"262-269"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85426736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Communication and Implementation Technique for Sybil Attack in Vehicular Ad-Hoc Networks 车载Ad-Hoc网络中Sybil攻击的安全通信及实现技术
Mukesh Soni, Anuj K. Jain
{"title":"Secure Communication and Implementation Technique for Sybil Attack in Vehicular Ad-Hoc Networks","authors":"Mukesh Soni, Anuj K. Jain","doi":"10.1109/ICCMC.2018.8487887","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487887","url":null,"abstract":"Sybil attack is when one node gains identity of another node. This in one of the dangerous attacks that can give rise to other attacks also. Hence, we present first the implementation of the attack. Secondly, we present the communication and detection algorithm of the sybil attack. In the algorithm, we propose novel approach to solve the problem of communication and detection of sybil attack. Furthermore, we implemented the suggested mechanism to verify the results.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"2011 1","pages":"539-543"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86325930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A HEURISTIC APPROACH OF SORTING USING LINKED LIST 使用链表进行排序的启发式方法
Shruti Pandey
{"title":"A HEURISTIC APPROACH OF SORTING USING LINKED LIST","authors":"Shruti Pandey","doi":"10.1109/ICCMC.2018.8487780","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487780","url":null,"abstract":"Sorting given numbers means arranging the given numbers either in ascending order or descending order. There are various algorithms for sorting a set of numbers. These algorithms take different time to sort numbers. Sorting a given set of numbers is of prime importance. For this the time complexities of various sorting algorithms have been analyzed. Aiming at the shortcomings of various traditional algorithms and the array-indexed sorting algorithm for natural numbers, this algorithm has been developed. This new developed algorithm is based on linked list and removes the shortcomings of various sorting algorithms. Using linked list as a method of sorting has reduced the time of the algorithm.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"14 1","pages":"446-450"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79921411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Runtime Analysis on Open Source Technologies 开源技术的运行时分析
Naresh Babu Muppalaneni, C. Pavan, G. S. Nithin Chowdary, K. Sai Teja, Kamalapati Yugendhar
{"title":"Runtime Analysis on Open Source Technologies","authors":"Naresh Babu Muppalaneni, C. Pavan, G. S. Nithin Chowdary, K. Sai Teja, Kamalapati Yugendhar","doi":"10.1109/ICCMC.2018.8488033","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488033","url":null,"abstract":"Web applications play a crucial role for many organizations, there are many technologies available in the market and each technology has its own advantage, so choosing the best one is important factor. In this paper we have studied the performance analysis of two open source technologies for developing web applications namely PHP and JSP. A comparative analysis is performed on the two open source technologies on different platforms. The web applications we are considering for runtime analysis are files uploading (JPEG, Text, pptx, Word, Pdf files), Database operations, Algorithm processing.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"24 1","pages":"422-425"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89806174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fibonacci Series Based Transition Reduction Dynamic Sector CODEC Design 基于斐波那契级数的过渡缩减动态扇区编解码器设计
N. Chintaiah, G. Reddy
{"title":"Fibonacci Series Based Transition Reduction Dynamic Sector CODEC Design","authors":"N. Chintaiah, G. Reddy","doi":"10.1109/ICCMC.2018.8487744","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487744","url":null,"abstract":"The process of data word transmission on an on-chip bus leads to switching activity of data bits on the bus wires, which charges and discharges the capacitance associated with the wires and consequently leads to dynamic power dissipation and delay increases. The amount of power dissipation at buses is significant compared to remaining circuit power dissipation. It is desirable to encode the values sent over these buses to decrease the switching activity and thereby reducing the bus power consumption and reducing the delay. In this paper, we present the input as Fibonacci sequence and partition the source word space into a number of sectors with a unique identifier. The combination of Fibonacci series and dynamic sector encoding technique (FS-DS) to reduce the number of transitions as well as to reduce the power dissipation and delay.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"16 6 1","pages":"596-600"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78469677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STORE WHEN BLOCKED AFTER FAIR PRIORITIZED PREEMPTION (SBFPP) PROTOCOL FOR NON BLOCKING OPTICAL BURST SWITCHED NETWORKS 非阻塞光突发交换网络的公平优先抢占(sbfpp)协议阻塞时存储
J. Tripathi, R.K. Singh
{"title":"STORE WHEN BLOCKED AFTER FAIR PRIORITIZED PREEMPTION (SBFPP) PROTOCOL FOR NON BLOCKING OPTICAL BURST SWITCHED NETWORKS","authors":"J. Tripathi, R.K. Singh","doi":"10.1109/ICCMC.2018.8487484","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487484","url":null,"abstract":"Just Enough Time is the most promising protocol of optical burst switched network, Different prioritization on the basis of fairness algorithms have been given for increasing the utilization of link. Still there is probability of blocking in the network at high load. In this Paper we have proposed a none blocking Optical Burst Switched network by proposing a new protocol for optical Burst switched network. In this paper we have also compared the blocking probabilities of JET with some fairness protocols with our proposed protocol. A simulated output for effective bandwidth utilization and dropping probabilities of all the outputs are also presented and compared.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"101 1","pages":"220-224"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74453193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emotion Recognition System based on EEG signal: A Comparative Study of Different Features and Classifiers 基于脑电信号的情绪识别系统:不同特征和分类器的比较研究
M. K. Ahirwal, M. Kose
{"title":"Emotion Recognition System based on EEG signal: A Comparative Study of Different Features and Classifiers","authors":"M. K. Ahirwal, M. Kose","doi":"10.1109/ICCMC.2018.8488044","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488044","url":null,"abstract":"In this paper, emotion recognition system based on electroencephalogram (EEG) signals has been implemented. The new technology of emotion recognition using physiological signal is based on pattern recognition and classification problem that is well described in this paper. A very famous dataset of EEG signals for emotion recognition known as DEAP dataset is used and three categories of features, time domain features, frequency domain features and entropy based features has been extracted. Classification through support vector machine (SVM), artificial neural networks (ANN) and Naïve bayes (NB) has been done. Performance of system is observed by the parameters like, classification accuracy, precision and recall. After performance observation, it is found that ANN gives the best performance with all types of features. Highest classification accuracy achieved by ANN for said dataset, entropy based features and implementation is 93.75 percent.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"28 1","pages":"472-476"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74189214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Biometrics Secured Voting System with Finger Print, Face and Iris Verification 具有指纹,面部和虹膜验证的生物识别安全投票系统
N. Kavitha.S., Shahila, Prasanna Kumar
{"title":"Biometrics Secured Voting System with Finger Print, Face and Iris Verification","authors":"N. Kavitha.S., Shahila, Prasanna Kumar","doi":"10.1109/ICCMC.2018.8487558","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487558","url":null,"abstract":"Election has a great effect on the minds of People. It is one of the significant features of our country India. In order to have an impartial elections world is conducting experiments with different technologies .Main objective is designing a Voting system model where it supports impartial Elections. In this project, Aadhar Card, Finger Print and Iris of the voter is verified before allowing him to cast the vote thus providing Secured Biometrics Voting System.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"168 1","pages":"743-746"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85585537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信