Breast Cancer: Classification of Breast Masses Mammograms using Artificial Neural Network and Support Vector Machine
This paper presents the diagnosis of breast cancer by using ANN and SVM. To deal with the different kinds of abnormalities causing Cancer, this report consists of all the modalities which help in detecting cancer and well as different methods of feature extraction. Such modalities can be named as: Mammography, Ultrasound, MRI etc [1]. Currently, Electrical impedance and nuclear medicine are used widely for diagnosis. These modalities Based on the image processing i.e. identification of abnormality is done through the reading and retrieving information from images. But this research is based on mammogram images. Before retrieving information one should know about all kinds of abnormalities like: micro classification, masses, architectural distortion, asymmetry, and breast density etc.[2]. And after the process of extracting the abnormal part or can say that ROI (Region of Interest) on which the treatment is applied. To extract ROI various methods are used like region growing, edge detection, segmentation etc. [3][4]. Then, feature extraction is done from which a lot of features are extracted on which feature selection is applied to get higher accuracy. After going through all researches done till now here I have got the conclusion that for determining the presence of cancer researcher uses different features but till now only few researcher used two features named shape and texture which needs good classification technique[1]. Then, classify into classes of normal and abnormal classes. From the statistical study it has been found that the trend in increasing cancer every year, thus, the best and most effective way to cure cancer is the removal of cancerous part.
Published by: Kamaldeep Kaur, Er. Pooja
Author: Kamaldeep Kaur
Paper ID: V2I3-1200
Paper Status: published
Published: June 29, 2016
Wireless Sensor Network: A Review
Wireless Sensor Networks (WSN) consists of nodes with limited power deployed in the area of interest. Nodes cooperate to collect, transmit and forward data to a base station. In WSN, clustering and scheduling techniques ensure collecting data in an energy efficient manner. In this work, we have reviewed many papers relating to clustering and scheduling of sensor network. After reviewing many papers and considering the latest one as the base paper we believe that the work done in it is the latest one, modifications in the work is suggested in report. This review give the basic description of wireless sensor network and their importance in energy efficiency and give a brief about most famous protocol is described leach and their improved version.
Published by: Sashi, Pooja Dhankar
Author: Sashi
Paper ID: V2I3-1199
Paper Status: published
Published: June 29, 2016
A Novel Self Organizing Clustering Scheme for Clusters Setup
Wireless Sensor Networks (WSN) consists of nodes with limited power deployed in the area of interest. Nodes cooperate to collect, transmit and forward data to a base station. In WSN, clustering and scheduling techniques ensure collecting data in an energy efficient manner. In this work, we have reviewed many papers relating to clustering and scheduling of sensor network. After reviewing many papers and considering the latest one as the base paper we believe that the work done in it is the latest one, modifications in the work is suggested in this report. This proposal give the basic description of wireless sensor network and their importance in energy efficiency and give a brief about most famous protocol is describes leach and their improved version In this work we have proposed a novel self organizing clustering scheme which considers the real time parameters for setting up the clusters for data collection. Unlike several proposed algorithm, this scheme re-clusters the network only when CH fall below a threshold level. Repeated unnecessary clustering in every round depletes the energy of the network more quickly. We have introduced heterogeneity in the proposed work. By virtue of heterogeneity in terms of energy, lifetime of the network can be extended. An algorithm is functional if the area of interest is covered by active nodes. The period for which the network is functional is termed as persistent period in our work. Simulation results show that the proposed scheme is comparatively more energy efficient, scalable robust and has longer persistent period. And later part of the proposal gives the advantage and disadvantage of these protocols.
Published by: Sashi, Pooja Dhankar
Author: Sashi
Paper ID: V2I3-1198
Paper Status: published
Published: June 29, 2016
Optimise the Gain of Optical Signal by SOA with Saturated ASE and Unsaturated ASE
Optical Amplifiers are essentials components in long haul fibre optic system. An amplifier is a electronic device that can increase the power of signal. An Optical Amplifier is effectively the opposite of attenuator while Optical Amplifiers provide gain and attenuator provides loss. When a signal travels in a optical fibre medium the signal suffer from various losses such as fibre losses, attenuation losses, fibre splice losses, reduce these losses use the Semiconductor method with saturated and unsaturated Amplified Spontaneous Emission. It reduces the phase shift and recover original signal.
Published by: Shilpa Thakur, Er. Vivek Gupta
Author: Shilpa Thakur
Paper ID: V2I3-1197
Paper Status: published
Published: June 29, 2016
A Novel Pre-Shared Information Defense Mechanism for Spoofed IP Attack in SDN – A Review
The software defined networks are being used in many scenarios where the ordinary or traditional network management becomes the real problem. Such networks are defined or managed with the SDN platform, which is used as the network programming rather than the network configuration. The problem of user legitimacy is a big issue in the cloud platforms. The user legitimacy assurance is quite important to protect the cloud platforms from several types of attacks. The user legitimacy assurance must be performed on two given events, one is pre-setup, second is post-setup. The existing models incorporate the post-setup phase authentication only, where the pre-setup phase is left immature, where the hackers can easily attack over. In this paper, we are proposing the model for the security of cloud by user legitimacy assurance during the pre-setup phase with the use of pre-shared information in the form or RUID (rigid user ID), which is provided to the user during the registration. The RUID will add the new layer of security by mitigating the threat of user session hijacking, which will make the cloud infrastructure highly secure in comparison with the existing models.
Published by: Manisha Lalotra, Meenakashi Sharma, Gurjeet Kaur,
Author: Manisha Lalotra
Paper ID: V2I3-1196
Paper Status: published
Published: June 25, 2016
Trusted Key Management with RSA based Security Policy for MANETS
A mobile ad-hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or an already existing infrastructure. Various key management authorities distributed over the network, each with a periodically updated share of the secrete key, is usually adopted. Thus many efforts have been made to adapt key management authority’s tasks to the dynamic environments of MANETS and distribute the tasks of among MANET nodes. At present various cryptographic techniques are being deployed to meet the ever-changing needs, which compels to device unique security mechanism for MANET, enabling individual and corporate entities to protect the transmission of data without any intrusion by illegal means. Cryptographic techniques could be either of symmetric key cryptography and or asymmetric key cryptography or hash functions. Symmetric cryptosystem requires the existence of common shared secret key between two communicating nodes whereas asymmetric cryptosystem maintains unique key pair between any two communicating nodes (peers). An asymmetric cryptosystem is more efficient in a given task oriented key utilization process. In this mechanism, the private key needs to be kept secret with one entity but the authenticity of the corresponding public key for the same entity must be guaranteed somehow by a trusted third party in this paper, a novel mutual authentication and key management (agreement) protocol has been developed for one hop communication in mobile ad-hoc networks. The protocol has several salient features like mutual authentication, confidentiality, integrity and key agreement. The protocol utilizes RSA signature generation and verification algorithm.
Published by: Vandana Arora, Sunil Ahuja
Author: Vandana Arora
Paper ID: V2I3-1195
Paper Status: published
Published: June 24, 2016