Hybrid approch for detection of event in sleep EEG
The wide variety of waveforms in EEG signals and the high non-stationary nature of many of them is one of the main difficulties to develop automatic detection systems for them. In sleep stage classification a relevant transient wave is the K-complex. This report comprehends the developing of new Fuzzy_Neural algorithm in order to achieve an automatic K-complex detection from EEG raw data. The Fuzzy c-means algorithm is used for the rough and rapid recognition of K-complex and the Neural Network classifier does the exact evaluation on the detected K-complex. This Pattern recognition technique is a hardware independent solution for the biomedical signal processing field. This represents a significant criterion for the objective assessment of a patient’s sleep quality.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Satellite Imagery Land Cover Classification using K-Means Clustering Algorithm Computer Vision for Environmental Information Extraction
Segmentation and classification of high resolution satellite imagery is a challenging problem due to the fact that it is no longer meaningful to carry out this task on a pixel-by-pixel basis. The fine spatial resolution implies that each object is an aggregation of a number of pixels in close spatial proximity, and accurate classification requires that this aspect be subtly considered. K-means clustering algorithm is a better method of classifying high resolution satellite imagery. The extracted regions are classified using a minimum distance decision rule. Several regions are selected as training samples for region classification. Each region is compared to the training samples and is assigned to its closest class. The procedure significantly reduces the mixed pixel problem suffered by most pixel based methods. In this paper, we used K-means clustering algorithm to classify satellite imagery into specific objects within it for cadastral and environmental planning purposes, thereby eliminating the above mentioned problems and getting better classification accuracy with the overall performance for accuracy percentage as 88.889% and Kappa values as 0.835.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Wireless pulmonary disease prediction system
Many chronic acute diseases affect the respiration of the patients. The monitoring of vital body signs such as respiration is becoming increasingly important, especially in view of the general aging of the population and the associated increase in chronic diseases. A quantitative, semi quantitative or even qualitative monitoring of respiration may help to detect pulmonary disorders such as apnea, Cheyne – stokes or Biot’s respiration. When used in a home setting, respiratory monitoring should be easy to use and not constrictive to for the patient. Moreover, because longtime monitoring entails direct connection between the patient and the system, the integration of such systems into clothing is desirable. A novel approach is presented for non constrictive long term – monitoring of respiration, which could particularly become suitable for home care applications. The system is based on textile integrated force sensors, which detect expansion of the thorax during respiration and allow wireless data transmission for maximum mobility. Possible application include long - term monitoring of patients with chronic pulmonary diseases, early recognition of disease and the performance measurement of athletes during excise. Results from performance tests under various conditions are presented. In addition, long – term respiratory monitoring systems could be used to monitor the performance of athletes and to optimize their training. Many qualitative, quantitative and semi – quantitative methods that are integrated in clothing for respiratory monitoring are available.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Novel Approach for Resolving Watermark Disputes through Watermark Authentication Server
Due to the rapid development of internet, perfect copy and illegal use of digital data becomes easy, which enforces the newer mechanism to provide means of protecting all forms of digital data. The purpose of this paper is to propose a novel approach of protecting the ownership rights and resolving the dispute of unauthorized addition of second watermark on already watermarked data by the use of watermark authentication server (WAS). Watermark authentication server serves as a trusted third party and solves the problem of deadlock in watermarking.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A review of feature selection models for classification
The success of a machine learning algorithm depends on quality of data .The data given for classification, should not contain irrelevant or redundant attributes. This invariably increases the processing time. The data set, selected for classification should contain the right attributes for accurate results. Feature selection is an essential data processing step, prior to applying a learning algorithm. Here we discuss some basic feature selection models and evaluation function. Experimental results are compared for individual datasets with filter and wrapper model.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Face recognition under expressions and lighting variations using artificial intelligence and image synthesizing
In this paper, we propose an integrated face recognition system that is robust against facial expressions by combining information from the computed intra-person optical flow and the synthesized face image in a probabilistic framework. Making recognition more reliable under uncontrolled lighting conditions is one of the most important challenges for practical face recognition systems. We tackle this by combining the strengths of robust illumination normalization. Our experimental results show that the proposed system improves the accuracy of face recognition from expressional face images and lighting variations.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A modified RSA cryptosystem based on ‘n’ prime numbers
To secure data or information by a modified RSA cryptosystem based on ‘n’ prime. This is a new technique to provide maximum security for data over the network. It is involved encryption, decryption, and key generation. Prime number used in a modified RSA cryptosystem to provide security over the networks. In this technique we used ‘n’ prime number which is not easily breakable. ‘n’ prime numbers are not easily decompose. This technique provides more efficiency and reliability over the networks. In this paper we are used a modified RSA cryptosystem algorithm to handle ‘n’ prime numbers and provides security.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Active operation based edit distance for duplicate detection
The problem of identifying approximately duplicate records in databases is an essential step for data cleaning and data integration processes. In the real world, entities have two or more representations in databases. Errors are introduced as the result of transcription errors, incomplete information, lack of standard formats, or any combination of these factors. Most of the existing approach has been depend on the generic or manual intervention is required to calculate the edit distance. None of the existing approach hasn’t focus on how many individual operations required for edit distance calculation, existing relied on total operation. In this paper, we present a thorough analysis of the literature on edit distance for duplicate detection. We cover similarity metrics that are commonly used to detect number of individual operation required to find a duplicate record, which includes the total required edit operation.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Delay Time Analysis and Energy Consumption Issues in Short Range Wireless Transaction System
Bluetooth is a promising short range wireless personal area network technology and is on the verge of being ubiquitously deployed over a wide range of devices. The basic unit of a Bluetooth network is a centralized master-slave topology, namely a piconet, which can be easily extended into a multi-hop adhoc network called a scatternet. Scatternets increase Bluetooth’s usability multi-folds such that numerous applications may be built over them to unleash the potential of Bluetooth. When more than seven devices to be connected in a Bluetooth scatternet, bridge devices are used to connect two piconets into a scatternet. To deal with possible data transmissions between different piconets, the bridge device must switch to different masters frequently. This may cause traffic in network.Our work tries to explore a less popular but powerful applications of Bluetooth which can help extend the range of Bluetooth communication and provide a free infrastructure for communication and find the transaction delay in Bluetooth network. Our approach is to design a transaction system that can be used to emulate and test the path selection from plentiful paths available from source to the destination. At the same this it assist user to select the optimal path. Due to this innovative approach; in transaction system it cause less traffic and it resultant in to less delay. Our work also analyzes the end-to-end packet delays, cumulative delay for both intra- and inter-piconet traffic and energy consumption, in a Bluetooth scatternet. Finally, we conduct simulations by using eclipse and NS-2 to demonstrate the efficiency and effectiveness of the proposed transaction system.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Designing web services communities with UML oriented agents
The incredible growth of the information space, the hard competition between enterprises populating it, the need to collaborate and to share knowledge guiding to better decisions are factors that push Web Services providers to join each other into Web Services communities. Solutions proposed to tackle communities’ management lack of a formal and clear design which may alter the system evolving and maintenance. For these reasons, we propose to design and to implement a system able to manage Web Services communities using an agent oriented approach. As illustration, we design and implement a case tool for managing e-health care Web Services communities.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]