Abstract: When neck pain is associated with pain, numbness, or
weakness in the arm, shoulder, or hand, further investigation is
needed as these are symptoms indicating pressure on one or more
nerve roots. Evaluation necessitates a neurologic examination and
imaging using an MRI/CT scan. A degenerating disc loses some
thickness and is less flexible, causing inter-vertebrae space to narrow.
A radiologist diagnoses an Intervertebral Disc Degeneration (IDD) by
localizing every inter-vertebral disc and identifying the pathology in
a disc based on its geometry and appearance. Accurate localizing is
necessary to diagnose IDD pathology. But, the underlying image
signal is ambiguous: a disc’s intensity overlaps the spinal nerve
fibres. Even the structure changes from case to case, with possible
spinal column bending (scoliosis). The inter-vertebral disc
pathology’s quantitative assessment needs accurate localization of the
cervical region discs. In this work, the efficacy of multilevel set
segmentation model, to segment cervical discs is investigated. The
segmented images are annotated using a simple distance matrix.
Abstract: The system for analyzing and eliciting public
grievances serves its main purpose to receive and process all sorts of
complaints from the public and respond to users. Due to the more
number of complaint data becomes big data which is difficult to store
and process. The proposed system uses HDFS to store the big data
and uses MapReduce to process the big data. The concept of cache
was applied in the system to provide immediate response and timely
action using big data analytics. Cache enabled big data increases the
response time of the system. The unstructured data provided by the
users are efficiently handled through map reduce algorithm. The
processing of complaints takes place in the order of the hierarchy of
the authority. The drawbacks of the traditional database system used
in the existing system are set forth by our system by using Cache
enabled Hadoop Distributed File System. MapReduce framework
codes have the possible to leak the sensitive data through
computation process. We propose a system that add noise to the
output of the reduce phase to avoid signaling the presence of
sensitive data. If the complaints are not processed in the ample time,
then automatically it is forwarded to the higher authority. Hence it
ensures assurance in processing. A copy of the filed complaint is sent
as a digitally signed PDF document to the user mail id which serves
as a proof. The system report serves to be an essential data while
making important decisions based on legislation.
Abstract: In the past decade, the use of digital image correlation
(DIC) techniques has increased significantly in the area of
experimental mechanics, especially for materials behavior
characterization. This non-contact tool enables full field displacement
and strain measurements over a complete region of interest. The DIC
algorithm requires a random contrast pattern on the surface of the
specimen in order to perform properly. To create this pattern, the
specimen is usually first coated using a white matt paint. Next, a
black random speckle pattern is applied using any suitable method. If
the applied paint coating is too thick, its top surface may not be able
to exactly follow the deformation of the specimen, and consequently,
the strain measurement might be underestimated. In the present
article, a study of the influence of the paint thickness on the strain
underestimation is performed for different strain levels. The results
are then compared to typical paint coating thicknesses applied by
experienced DIC users. A slight strain underestimation was observed
for paint coatings thicker than about 30μm. On the other hand, this
value was found to be uncommonly high compared to coating
thicknesses applied by DIC users.
Abstract: Image segmentation and edge detection is a fundamental section in image processing. In case of noisy images Edge Detection is very less effective if we use conventional Spatial Filters like Sobel, Prewitt, LOG, Laplacian etc. To overcome this problem we have proposed the use of Stochastic Gradient Mask instead of Spatial Filters for generating gradient images. The present study has shown that the resultant images obtained by applying Stochastic Gradient Masks appear to be much clearer and sharper as per Edge detection is considered.
Abstract: Due to rapid advancement of powerful image
processing software, digital images are easy to manipulate and
modify by ordinary people. Lots of digital images are edited for a
specific purpose and more difficult to distinguish form their original
ones. We propose a clustering method to detect a copy-move image
forgery of JPEG, BMP, TIFF, and PNG. The process starts with
reducing the color of the photos. Then, we use the clustering
technique to divide information of measuring data by Hausdorff
Distance. The result shows that the purposed methods is capable of
inspecting the image file and correctly identify the forgery.
Abstract: This article presents our prototype MASET (Multi
Agents System for E-Tutoring Learners engaged in online
collaborative work). MASET that we propose is a system which
basically aims to help tutors in monitoring the collaborative work of
students and their various interactions. The evaluation of such
interactions by the tutor is based on the results provided by the
automatic analysis of the interaction indicators. This system is
predicated upon the middleware JADE (Java Agent Development
Framework) and e-learning Moodle platform. The MASET
environment is modeled by AUML which allows structuring the
different interactions between agents for the fulfillment and
performance of online collaborative work. This multi-agent system
has been the subject of a practical experimentation based on the
interactions data between Master Computer Engineering and System
students.
Abstract: Driver fatigue is an important factor in the increasing
number of road accidents. Dynamic template matching method was
proposed to address the problem of real-time driver fatigue detection
system based on eye-tracking. An effective vision based approach
was used to analyze the driver’s eye state to detect fatigue. The driver
fatigue system consists of Face detection, Eye detection, Eye
tracking, and Fatigue detection. Initially frames are captured from a
color video in a car dashboard and transformed from RGB into YCbCr
color space to detect the driver’s face. Canny edge operator was used
to estimating the eye region and the locations of eyes are extracted.
The extracted eyes were considered as a template matching for eye
tracking. Edge Map Overlapping (EMO) and Edge Pixel Count
(EPC) matching function were used for eye tracking which is used to
improve the matching accuracy. The pixel of eyeball was tracked
from the eye regions which are used to determine the fatigue state of
the driver.
Abstract: This paper presents a novel algorithm for secure,
reliable and flexible transmission of big data in two hop wireless
networks using cooperative jamming scheme. Two hop wireless
networks consist of source, relay and destination nodes. Big data has
to transmit from source to relay and from relay to destination by
deploying security in physical layer. Cooperative jamming scheme
determines transmission of big data in more secure manner by
protecting it from eavesdroppers and malicious nodes of unknown
location. The novel algorithm that ensures secure and energy balance
transmission of big data, includes selection of data transmitting
region, segmenting the selected region, determining probability ratio
for each node (capture node, non-capture and eavesdropper node) in
every segment, evaluating the probability using binary based
evaluation. If it is secure transmission resume with the two- hop
transmission of big data, otherwise prevent the attackers by
cooperative jamming scheme and transmit the data in two-hop
transmission.
Abstract: Image Processing is a structure of Signal Processing
for which the input is the image and the output is also an image or
parameter of the image. Image Resolution has been frequently
referred as an important aspect of an image. In Image Resolution
Enhancement, images are being processed in order to obtain more
enhanced resolution. To generate highly resoluted image for a low
resoluted input image with high PSNR value. Stationary Wavelet
Transform is used for Edge Detection and minimize the loss occurs
during Downsampling. Inverse Discrete Wavelet Transform is to get
highly resoluted image. Highly resoluted output is generated from the
Low resolution input with high quality. Noisy input will generate
output with low PSNR value. So Noisy resolution enhancement
technique has been used for adaptive sub-band thresholding is used.
Downsampling in each of the DWT subbands causes information loss
in the respective subbands. SWT is employed to minimize this loss.
Inverse Discrete wavelet transform (IDWT) is to convert the object
which is downsampled using DWT into a highly resoluted object.
Used Image denoising and resolution enhancement techniques will
generate image with high PSNR value. Our Proposed method will
improve Image Resolution and reached the optimized threshold.
Abstract: We present a refined multiscale Shannon entropy for
analyzing electroencephalogram (EEG), which reflects the underlying
dynamics of EEG over multiple scales. The rationale behind
this method is that neurological signals such as EEG possess
distinct dynamics over different spectral modes. To deal with the
nonlinear and nonstationary nature of EEG, the recently developed
empirical mode decomposition (EMD) is incorporated, allowing a
decomposition of EEG into its inherent spectral components, referred
to as intrinsic mode functions (IMFs). By calculating the Shannon
entropy of IMFs in a time-dependent manner and summing them over
adaptive multiple scales, it results in an adaptive subscale entropy
measure of EEG. Simulation and experimental results show that
the proposed entropy properly reveals the dynamical changes over
multiple scales.
Abstract: Software fault prediction models are created by using
the source code, processed metrics from the same or previous version
of code and related fault data. Some company do not store and keep
track of all artifacts which are required for software fault prediction.
To construct fault prediction model for such company, the training
data from the other projects can be one potential solution. Earlier we
predicted the fault the less cost it requires to correct. The training
data consists of metrics data and related fault data at function/module
level. This paper investigates fault predictions at early stage using the
cross-project data focusing on the design metrics. In this study,
empirical analysis is carried out to validate design metrics for cross
project fault prediction. The machine learning techniques used for
evaluation is Naïve Bayes. The design phase metrics of other projects
can be used as initial guideline for the projects where no previous
fault data is available. We analyze seven datasets from NASA
Metrics Data Program which offer design as well as code metrics.
Overall, the results of cross project is comparable to the within
company data learning.
Abstract: This paper investigates simple implicit force control
algorithms realizable with industrial robots. A lot of approaches
already published are difficult to implement in commercial robot
controllers, because the access to the robot joint torques is necessary
or the complete dynamic model of the manipulator is used. In
the past we already deal with explicit force control of a position
controlled robot. Well known schemes of implicit force control are
stiffness control, damping control and impedance control. Using such
algorithms the contact force cannot be set directly. It is further
the result of controller impedance, environment impedance and
the commanded robot motion/position. The relationships of these
properties are worked out in this paper in detail for the chosen
implicit approaches. They have been adapted to be implementable
on a position controlled robot. The behaviors of stiffness control
and damping control are verified by practical experiments. For this
purpose a suitable test bed was configured. Using the full mechanical
impedance within the controller structure will not be practical in the
case when the robot is in physical contact with the environment. This
fact will be verified by simulation.
Abstract: Thousands of organisations store important and
confidential information related to them, their customers, and their
business partners in databases all across the world. The stored data
ranges from less sensitive (e.g. first name, last name, date of birth) to
more sensitive data (e.g. password, pin code, and credit card
information). Losing data, disclosing confidential information or
even changing the value of data are the severe damages that
Structured Query Language injection (SQLi) attack can cause on a
given database. It is a code injection technique where malicious SQL
statements are inserted into a given SQL database by simply using a
web browser. In this paper, we propose an effective pattern
recognition neural network model for detection and classification of
SQLi attacks. The proposed model is built from three main elements
of: a Uniform Resource Locator (URL) generator in order to generate
thousands of malicious and benign URLs, a URL classifier in order
to: 1) classify each generated URL to either a benign URL or a
malicious URL and 2) classify the malicious URLs into different
SQLi attack categories, and a NN model in order to: 1) detect either a
given URL is a malicious URL or a benign URL and 2) identify the
type of SQLi attack for each malicious URL. The model is first
trained and then evaluated by employing thousands of benign and
malicious URLs. The results of the experiments are presented in
order to demonstrate the effectiveness of the proposed approach.
Abstract: This article presents two methods for the
compensation of harmonics generated by a nonlinear load. The first is
the classic method P-Q. The second is the controller by modern
method of artificial intelligence specifically fuzzy logic. Both
methods are applied to a shunt Active Power Filter (sAPF) based on a
three-phase voltage converter at five levels NPC topology. In
calculating the harmonic currents of reference, we use the algorithm
P-Q and pulse generation, we use the intersective PWM. For
flexibility and dynamics, we use fuzzy logic. The results give us clear
that the rate of Harmonic Distortion issued by fuzzy logic is better
than P-Q.
Abstract: A new steganographic method via the use of numeric
data on public websites with a self-authentication capability is
proposed. The proposed technique transforms a secret message into
partial shares by Shamir’s (k, n)-threshold secret sharing scheme with
n = k + 1. The generated k+1 partial shares then are embedded into the
numeric items to be disguised as part of the website’s numeric content,
yielding the stego numeric content. Afterward, a receiver links to the
website and extracts every k shares among the k+1 ones from the stego
numeric content to compute k+1 copies of the secret, and the
phenomenon of value consistency of the computed k+1 copies is taken
as an evidence to determine whether the extracted message is authentic
or not, attaining the goal of self-authentication of the extracted secret
message. Experimental results and discussions are provided to show
the feasibility and effectiveness of the proposed method.
Abstract: This research study aims to present a retrospective
study about speech recognition systems and artificial intelligence.
Speech recognition has become one of the widely used technologies,
as it offers great opportunity to interact and communicate with
automated machines. Precisely, it can be affirmed that speech
recognition facilitates its users and helps them to perform their daily
routine tasks, in a more convenient and effective manner. This
research intends to present the illustration of recent technological
advancements, which are associated with artificial intelligence.
Recent researches have revealed the fact that speech recognition is
found to be the utmost issue, which affects the decoding of speech. In
order to overcome these issues, different statistical models were
developed by the researchers. Some of the most prominent statistical
models include acoustic model (AM), language model (LM), lexicon
model, and hidden Markov models (HMM). The research will help in
understanding all of these statistical models of speech recognition.
Researchers have also formulated different decoding methods, which
are being utilized for realistic decoding tasks and constrained
artificial languages. These decoding methods include pattern
recognition, acoustic phonetic, and artificial intelligence. It has been
recognized that artificial intelligence is the most efficient and reliable
methods, which are being used in speech recognition.
Abstract: This research paper presents highly optimized barrel
shifter at 22nm Hi K metal gate strained Si technology node. This
barrel shifter is having a unique combination of static and dynamic
body bias which gives lowest power delay product. This power delay
product is compared with the same circuit at same technology node
with static forward biasing at ‘supply/2’ and also with normal reverse
substrate biasing and still found to be the lowest. The power delay
product of this barrel sifter is .39362X10-17J and is lowered by
approximately 78% to reference proposed barrel shifter at 32nm bulk
CMOS technology. Power delay product of barrel shifter at 22nm Hi
K Metal gate technology with normal reverse substrate bias is
2.97186933X10-17J and can be compared with this design’s PDP of
.39362X10-17J. This design uses both static and dynamic substrate
biasing and also has approximately 96% lower power delay product
compared to only forward body biased at half of supply voltage. The
NMOS model used are predictive technology models of Arizona state
university and the simulations to be carried out using HSPICE
simulator.
Abstract: Fabric textures are very common in our daily life.
However, the representation of fabric textures has never been explored
from neuroscience view. Theoretical studies suggest that primary
visual cortex (V1) uses a sparse code to efficiently represent natural
images. However, how the simple cells in V1 encode the artificial
textures is still a mystery. So, here we will take fabric texture as
stimulus to study the response of independent component analysis that
is established to model the receptive field of simple cells in V1. We
choose 140 types of fabrics to get the classical fabric textures as
materials. Experiment results indicate that the receptive fields of
simple cells have obvious selectivity in orientation, frequency and
phase when drifting gratings are used to determine their tuning
properties. Additionally, the distribution of optimal orientation and
frequency shows that the patch size selected from each original fabric
image has a significant effect on the frequency selectivity.
Abstract: The Orthogonal Frequency Division Multiplexing
(OFDM) with high data rate, high spectral efficiency and its ability to
mitigate the effects of multipath makes them most suitable in wireless
application. Impulsive noise distorts the OFDM transmission and
therefore methods must be investigated to suppress this noise. In this
paper, a State Space Recursive Least Square (SSRLS) algorithm
based adaptive impulsive noise suppressor for OFDM
communication system is proposed. And a comparison with another
adaptive algorithm is conducted. The state space model-dependent
recursive parameters of proposed scheme enables to achieve steady
state mean squared error (MSE), low bit error rate (BER), and faster
convergence than that of some of existing algorithm.
Abstract: In this paper, we propose a system for preventing gas
risks through the use of wireless communication modules and
intelligent gas safety appliances. Our system configuration consists of
an automatic extinguishing system, detectors, a wall-pad, and a
microcomputer controlled micom gas meter to monitor gas flow and
pressure as well as the occurrence of earthquakes. The automatic fire
extinguishing system checks for both combustible gaseous leaks and
monitors the environmental temperature, while the detector array
measures smoke and CO gas concentrations. Depending on detected
conditions, the micom gas meter cuts off an inner valve and generates
a warning, the automatic fire-extinguishing system cuts off an external
valve and sprays extinguishing materials, or the sensors generate
signals and take further action when smoke or CO are detected.
Information on intelligent measures taken by the gas safety appliances
and sensors are transmitted to the wall-pad, which in turn relays this as
real time data to a server that can be monitored via an external network
(BcN) connection to a web or mobile application for the management
of gas safety. To validate this smart-home gas management system, we
field-tested its suitability for use in Korean apartments under several
scenarios.