In recent years percutaneous treatments for cancer have won momentum in the medical field. With it new needle insertion robots appeared to overcome the difficulties associated with needle insertion into soft tissue. A...
详细信息
ISBN:
(纸本)9783319083384;9783319083377
In recent years percutaneous treatments for cancer have won momentum in the medical field. With it new needle insertion robots appeared to overcome the difficulties associated with needle insertion into soft tissue. At first, the main focus was to achieve high needle placement accuracy, however, the focus nowadays has shifted toward needle steering and patient specific needle tissue interaction. In this paper we present a classification method to detect the type of tissue being punctured in real time. The purpose of the proposed method is to detect particular events that can be used in a situational awareness agent. First, we will introduce the methodology to create the statistical models used for classification, next, we prove the feasibility of the proposed classification method with experimental results and show that the proposed method hit a target even when tissue is deformed by analyzing needle insertion force patterns.
Wireless sensor networks have set a new realm in the field of wireless transmission technology. Their applications have diversified over the years and now they cover various sophisticated areas of applications which i...
详细信息
The water quality analysis has been an intriguing subject in the recent years because of the issues related to water resources. The work presents the application of the genetic algorithm to water samples containing co...
详细信息
The water quality analysis has been an intriguing subject in the recent years because of the issues related to water resources. The work presents the application of the genetic algorithm to water samples containing contaminants for the optimal selection of electrode and the corresponding frequency for the better classification of various contaminants. We have used 24 water samples containing 8 different heavy metal ions (Cd, Co, Zn, Ni, Cu, Cr, Ar and Pb) for our experiment. The electrodes used were Gold, Platinum, Glassy Carbon and Silver Nanoparticle electrode. The impedance values of these four electrodes are recorded as Single-Electrode Multi-Frequency (SEMF), Single-Frequency Multi-Electrode (SFME) and Multi-Electrode Multi-Frequency (MEMF). The impedance values are subjected to Principal Component Analysis. Further, the optimal classification of various metal ions present in the water samples is done using Genetic Algorithm and this is validated by the application of Davis Bouldin index. The results show that DBI value may be enhanced by choosing electrode with optimum frequency. (C) 2016 Published by Elsevier B.V.
Over the last five decades, clustering has established itself as a primary unsupervised learning technique. In most major data mining projects clustering can serve as a first step in understanding the available data. ...
详细信息
ISBN:
(纸本)9783319471600;9783319471594
Over the last five decades, clustering has established itself as a primary unsupervised learning technique. In most major data mining projects clustering can serve as a first step in understanding the available data. Clustering is used for creating meaningful profiles of entities in an application. It can also be used to compress the dataset into more manageable granules. The initial methods of crisp clustering objects represented using numeric attributes have evolved to address the demands of the real-world. These extensions include the use of softcomputing techniques such as fuzzy and rough set theory, the use of centroids and medoids for computational efficiency, modes to accommodate categorical attributes, dynamic and stream clustering for managing continuous accumulation of data, and meta-clustering for correlating parallel clustering processes. This paper uses applications in engineering, web usage, retail, finance, and social networks to illustrate some of the recentadvances in clustering and their role in improved profiling, as well as augmenting prediction, classification, association mining, dimensionality reduction, and optimization tasks.
In this paper, we introduce seven correlated algorithms for reduction of decision making parameters. This reduction framework is heuristic function based. The reduction of soft set decision parameters, those are colle...
详细信息
ISBN:
(纸本)9781479985807
In this paper, we introduce seven correlated algorithms for reduction of decision making parameters. This reduction framework is heuristic function based. The reduction of soft set decision parameters, those are collectively sufficient and individually necessary for keeping any special characteristic of a given information system. There has been very few works done on the algorithmic reduction techniques of decision parameter of soft set To the best of our knowledge, the computing complexities of available methods are of exponential order. We claim that our method is the first such kind of algorithms having polynomial time of computation. Illustrative example demonstrates the process elaborately.
In Wireless Sensor Networks (WSNs), sensor nodes are power constrained and have restricted lifetime. This necessitates understanding how much long the network prevails its networking operations as it is first concern ...
详细信息
ISBN:
(纸本)9781467397469
In Wireless Sensor Networks (WSNs), sensor nodes are power constrained and have restricted lifetime. This necessitates understanding how much long the network prevails its networking operations as it is first concern of mission critical applications. In recent years, to increase network life, proper uses of routing protocols have been proposed. soft-computing (SC) technique highly addresses their compatibility and adaptability to overcome the complex challenges in WSNs. This paper explores the usage of SC based methods in design of routing models for WSNs that optimizes network life time.
In this paper, a review of softcomputing techniques in biometrics is presented. Biometrics has become one of the most promising authentication techniques in the last few years but issues like False Acceptance Rate, F...
详细信息
ISBN:
(纸本)9781467382533
In this paper, a review of softcomputing techniques in biometrics is presented. Biometrics has become one of the most promising authentication techniques in the last few years but issues like False Acceptance Rate, False Rejection Rate still prevails in biometrics. An efficient biometric system has higher recognition rate, tolerance for imprecision, uncertainty and noisy data. recently, softcomputing has gained wide popularity in biometric recognition where it has helped in improving the recognition rate to a great extent. Various softcomputing techniques like fuzzy logic, evolutionary algorithm and artificial neural network has increasingly being used for the construction of efficient biometric systems. This paper first presents the introduction to biometrics along with the issues involved in it. A brief description of various softcomputing techniques for feature extraction, fusion, feature optimization, improvement of recognition rate in biometrics is provided. Finally future research areas are presented.
Cybercrime has led to the loss of billions of dollars, the malfunctioning of computer systems, the destruction of critical information, the compromising of network integrity and confidentiality, etc. In view of these ...
详细信息
Cybercrime has led to the loss of billions of dollars, the malfunctioning of computer systems, the destruction of critical information, the compromising of network integrity and confidentiality, etc. In view of these crimes committed on a daily basis, the security of the computer systems has become imperative to minimize and possibly avoid the impact of cybercrimes. In this paper, we review recentadvances in the use of cyber security benchmark datasets for the evaluation of machine learning and data mining-based intrusion detection systems. It was found that the state-of-the-art cyber security benchmark datasets KDD and UNM are no longer reliable, because their datasets cannot meet the expectations of current advances in computer technology. As a result, a new ADFA Linux (ADFA-LD) cyber security benchmark dataset for the evaluation of machine learning and data mining-based intrusion detection systems was proposed in 2013 to meet the current significant advances in computer technology. ADFA-LD requires improvement in terms of full descriptions of its attributes. This review can be used by the research community as a basis for abandoning the previous state-of-the-art cyber security benchmark datasets and starting to use the newly introduced benchmark dataset for effective and robust evaluation of machine learning and data mining-based intrusion detection system. (C) 2015 The Authors. Published by Elsevier B.V.
The proceedings contain 157 papers. The topics discussed include: nonlinear robust observers for ball and beam system: a comparative analysis;performance analysis of an intrusion detection system using Panjab universi...
ISBN:
(纸本)9781467382533
The proceedings contain 157 papers. The topics discussed include: nonlinear robust observers for ball and beam system: a comparative analysis;performance analysis of an intrusion detection system using Panjab university intrusion dataset;power allocation schemes for OFDM-based cognitive radio networks;digital signature verification scheme for image authentication;FOPID controller optimization employing PSO and TRSBF function;analyzing short circuit forces in transformer with single layer helical LV winding using FEM;left handed metamaterial antenna design for GSM 1.8 GHz applications;ACI ( automated continuous integration) using Jenkins: key for successful embedded software development;a review of softcomputing techniques in biometrics;optimal network selection using MADM algorithms;distance based verification techniques for online signature verification system;and multimodel biometric system: fusion techniques and their comparison.
暂无评论