As the lung cancer is the leading cause of cancer
death in the medical field, Computed Tomography (CT) scan
of the thorax is widely applied in diagnoses for identifying
the lung cancer. In this paper, a technique of rotation invariant
with Local Binary Pattern (LBP) for segmentation of various
lung nodules from the Lung CT cancer data sets is used. This
is tested on various lung data sets from teaching files of
Casimage database and National Cancer Institute (NCI) of
National Biomedical Imaging Archive (NBIA). The results
show the segmented nodules with clear boundaries, which is
helpful in diagnosis of lung cancer. Further, the results are
compared with the watershed segmentation method, which
shows that LBP based method yields better segmentation
accuracy.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Image segmentation is still an active reason of research, a relevant research area
in computer vision and hundreds of image segmentation techniques have been proposed by
the researchers. All proposed techniques have their own usability and accuracy. In this paper
we are going present a review of some best lung nodule existing detection and segmentation
techniques. Finally, we conclude by focusing one of the best methods that may have high
level accuracy and can be used in detection of lung very small nodules accurately.
Lung Cancer Detection on CT Images by using Image Processingijtsrd
This project is mainly based on image processing technique. In this work MATLAB have been used through every procedure made. Image processing techniques are widely use in bio-medical sector. The objective of our work is noise removal operation, thresholding, gray scale imaging, histogram equalization, texture segmentation, and morphological operation. Detection of lung cancer from computed tomography (CT) images is done by using MATLAB software. By using these methods the work has been done on CT images and the final tumor area has been shown with pixel values. Bindiya Patel | Dr. Pankaj Kumar Mishra | Prof. Amit Kolhe"Lung Cancer Detection on CT Images by using Image Processing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11674.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11674/lung-cancer-detection-on-ct-images-by-using-image-processing/bindiya-patel
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Image segmentation is still an active reason of research, a relevant research area
in computer vision and hundreds of image segmentation techniques have been proposed by
the researchers. All proposed techniques have their own usability and accuracy. In this paper
we are going present a review of some best lung nodule existing detection and segmentation
techniques. Finally, we conclude by focusing one of the best methods that may have high
level accuracy and can be used in detection of lung very small nodules accurately.
Lung Cancer Detection on CT Images by using Image Processingijtsrd
This project is mainly based on image processing technique. In this work MATLAB have been used through every procedure made. Image processing techniques are widely use in bio-medical sector. The objective of our work is noise removal operation, thresholding, gray scale imaging, histogram equalization, texture segmentation, and morphological operation. Detection of lung cancer from computed tomography (CT) images is done by using MATLAB software. By using these methods the work has been done on CT images and the final tumor area has been shown with pixel values. Bindiya Patel | Dr. Pankaj Kumar Mishra | Prof. Amit Kolhe"Lung Cancer Detection on CT Images by using Image Processing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11674.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11674/lung-cancer-detection-on-ct-images-by-using-image-processing/bindiya-patel
Microscopic Digital Image Segmentation And feature Extraction of Acute LeukemiaEditor IJCATR
The goal of this paper is to identify and show the
differences in the properties of Acute lymphoblastic leukemia (ALL)
and normal white blood cells. This paper was conducted on a set of
microscopic digital images of blood samples that got it from the
“Oncology Center - Faculty of Medicine - Mansoura University
Hospital - Egypt” is made up of 50 microscope image samples of
Cancerous blood and 50 microscope image of the blood samples is
not Cancerous (normal blood). The microscope blood images are
undergo to chain of pre-processing steps which include resizing
image such as (512*512, 256*256, 128*128) and contrast
enhancement. By executing K-means clustering on the resultant
images, the cell's nucleus under consideration is obtained then these
segmented images enter sub-image stage. The next step is Extracted
Features that included: Shape features (Area, Perimeter,
Compactness, Solidity, Eccentricity, and Elongation); texture features
(Homogeneity, Energy, Correlation, Entropy, and Contrast); color
features and Fractal Dimension
DETERMINATION OF BREAST CANCER AREA FROM MAMMOGRAPHY IMAGES USING THRESHOLDIN...AM Publications
Calculation of breast cancer areaby an image analysis on mammography using thresholding method has been done.The mammography images ware taken from three sides of projection which include oblique (mlo), lateral (ml) and cranial caudal (cc).The results achieved were expected to facilitate in calculating the area of breast cancer for the next stage examination.The thresholding method used was based on the pixel separation in different classes, depending on each grey levels of pixel.The area calculation has been performed by summing the number of pixels that build up the object in the image.The calculation results of the object’s wide obtained from three sides, i.e. mlo, ml, and cc, are 4.49 cm2, 3.03 cm2, and2.58 cm2, respectively.These values indicate that the image processing techniques developed can be implemented to calculate the area of breast cancer.
Lung Cancer Detection using Machine Learningijtsrd
Modern three dimensional 3 D medical imaging offers the potential and promise for major advances in science and medicine as higher fidelity images are produced. Due to advances in computer aided diagnosis and continuous progress in the field of computerized medical image visualization, there is need to develop one of the most important fields within scientific imaging. From the early basis report on cancer patients it has been seen that a greater number of people die of lung cancer than from other cancers such as colon, breast and prostate cancers combined. Lung cancer are related to smoking or secondhand smoke , or less often to exposure to radon or other environmental factors that’s why this can be prevented. But still it is not yet clear if these cancers can be prevented or not. In this research work, approach of segmentation, feature extraction and Convolution Neural Network CNN will be applied for locating, characterizing cancer portion. Harpreet Singh | Er. Ravneet Kaur | "Lung Cancer Detection using Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33659.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-architecture/33659/lung-cancer-detection-using-machine-learning/harpreet-singh
Brain tumor classification using artificial neural network on mri imageseSAT Journals
Abstract
In this paper, an attempt has been made to summarize the multi-resolution transformation and the different classifiers useful to
analyze the brain tumor using MRI. X-ray, MRI, Ultrasound etc. are different techniques used to scan brain tumor images.
Radiologist prefers MRI to get detail information about tumor to help him diagnoses. In this paper we have used MRI of brain
tumor for analysis. We have used Digital image processing tool for detection of the tumor. The identification, detection and
classification of brain tumor have been done by extracting features from MRI with the help of wavelet transformation. The MRI of
brain tumor is classified into two categories normal and abnormal brain. In this work Digital image processing has been used as
a tool for getting clear and exact details about tumor in earlier stages. This helps the physicians and practitioners for diagnoses.
Key word – Brain tumor, Wavelet transform, segmentation.
Microscopic Digital Image Segmentation And feature Extraction of Acute LeukemiaEditor IJCATR
The goal of this paper is to identify and show the
differences in the properties of Acute lymphoblastic leukemia (ALL)
and normal white blood cells. This paper was conducted on a set of
microscopic digital images of blood samples that got it from the
“Oncology Center - Faculty of Medicine - Mansoura University
Hospital - Egypt” is made up of 50 microscope image samples of
Cancerous blood and 50 microscope image of the blood samples is
not Cancerous (normal blood). The microscope blood images are
undergo to chain of pre-processing steps which include resizing
image such as (512*512, 256*256, 128*128) and contrast
enhancement. By executing K-means clustering on the resultant
images, the cell's nucleus under consideration is obtained then these
segmented images enter sub-image stage. The next step is Extracted
Features that included: Shape features (Area, Perimeter,
Compactness, Solidity, Eccentricity, and Elongation); texture features
(Homogeneity, Energy, Correlation, Entropy, and Contrast); color
features and Fractal Dimension
DETERMINATION OF BREAST CANCER AREA FROM MAMMOGRAPHY IMAGES USING THRESHOLDIN...AM Publications
Calculation of breast cancer areaby an image analysis on mammography using thresholding method has been done.The mammography images ware taken from three sides of projection which include oblique (mlo), lateral (ml) and cranial caudal (cc).The results achieved were expected to facilitate in calculating the area of breast cancer for the next stage examination.The thresholding method used was based on the pixel separation in different classes, depending on each grey levels of pixel.The area calculation has been performed by summing the number of pixels that build up the object in the image.The calculation results of the object’s wide obtained from three sides, i.e. mlo, ml, and cc, are 4.49 cm2, 3.03 cm2, and2.58 cm2, respectively.These values indicate that the image processing techniques developed can be implemented to calculate the area of breast cancer.
Lung Cancer Detection using Machine Learningijtsrd
Modern three dimensional 3 D medical imaging offers the potential and promise for major advances in science and medicine as higher fidelity images are produced. Due to advances in computer aided diagnosis and continuous progress in the field of computerized medical image visualization, there is need to develop one of the most important fields within scientific imaging. From the early basis report on cancer patients it has been seen that a greater number of people die of lung cancer than from other cancers such as colon, breast and prostate cancers combined. Lung cancer are related to smoking or secondhand smoke , or less often to exposure to radon or other environmental factors that’s why this can be prevented. But still it is not yet clear if these cancers can be prevented or not. In this research work, approach of segmentation, feature extraction and Convolution Neural Network CNN will be applied for locating, characterizing cancer portion. Harpreet Singh | Er. Ravneet Kaur | "Lung Cancer Detection using Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33659.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-architecture/33659/lung-cancer-detection-using-machine-learning/harpreet-singh
Brain tumor classification using artificial neural network on mri imageseSAT Journals
Abstract
In this paper, an attempt has been made to summarize the multi-resolution transformation and the different classifiers useful to
analyze the brain tumor using MRI. X-ray, MRI, Ultrasound etc. are different techniques used to scan brain tumor images.
Radiologist prefers MRI to get detail information about tumor to help him diagnoses. In this paper we have used MRI of brain
tumor for analysis. We have used Digital image processing tool for detection of the tumor. The identification, detection and
classification of brain tumor have been done by extracting features from MRI with the help of wavelet transformation. The MRI of
brain tumor is classified into two categories normal and abnormal brain. In this work Digital image processing has been used as
a tool for getting clear and exact details about tumor in earlier stages. This helps the physicians and practitioners for diagnoses.
Key word – Brain tumor, Wavelet transform, segmentation.
Abstract
This paper proposes a survey on the classification techniques of lung nodules. We have the different classifications about the nodules in the lungs. It contains the different methods of classification, segmentation and detection techniques. Malignant cell presented in the lungs named , nodules are classified for the treatment processes. Thresholding and Robust segmentation techniques are used in the segmentation process and the feature set is used for classification. Low Dose CT(Computed Tomography) images are applied. This survey has the information about the efficient techniques which are all used for the nodule classification. In these days lung cancer is the dangerous dead disease in the world, So we need to have the knowledge of that cancer. In starting stages the micro nodules are then formed into a cancer cell. Among the cancer affected population about 20% of the people are dead due to lung cancer. If nodules are found in a starting stage, we can be extend the lifetime of the patient. The main process of this paper involves with the nodule classification and segmentation process of the lung nodules. Here we taken the different procedures involved with nodule detections. CT is the most appropriate imaging technique to obtain anatomical information about lung nodules and the surrounding structures. Here we taken the Low Dose CT(LDCT) images for operations. This paper has the various approaches of the nodule classification. In this survey different techniques are presented which are used for detection and classification of the nodules in the lungs. By differentiating the nodules from the anatomical parts of the lungs, the nodules are identified.
Keywords: PLSA, Robust Segmentation and Partitioning.
Segmentation and Classification of Lung Nodule in Chest Radiograph ImageIJTET Journal
Abstract-Image segmentation plays a vital step in medical image processing. Lung cancer is the largest cause of tumor deaths. Since the nodules are commonly attached to blood vessels, detection of lung nodules is the challenging task .By early detection the lung cancer can be completely recovered. Especially in the case of lung nodule detection Computer Aided Detection (CAD) is effective for the improvement of radiologists‟ diagnosis. In this paper an efficient lung nodule detection scheme is developed by performing nodule segmentation through Fuzzy C-Means (FCM) and Virtual Dual Energy (VDE). Here the input image is considered as an radiograph image, then the lung is segmented by using Multi segment Active Shape Model (MASM). Finally neural network classifies as a nodule or non-nodule candidates.
In this paper we present a novel technique for characterizing and classifying 3D textured volumes belonging to different lung tissues in 3D CT images.We build a volume based 3D descripton, robust to changes of size, rigid spatial transformations and texture variability, thanks to the integration of Riesz-wavelet features within a Covariance-based descriptor formulation. 3D Riesz features characterize the morphology of tissue density thanks to their response to changes in intensity in CT images. These features are encoded in a Covariancebased descripton formulation: this provides a compact and flexible representation thanks to the use of feature variations rather than dense features themselves, and adds robustness to spatial changes. Furthermore, the particular symmetric definite positive matrix form of these descriptors causes them to lay in a Riemannian manifold. Thus, descriptors can be compared with analytical measures, and accurate techniques from Machine Learning and clustering can be adapted to their spatial domain. Additionally we present a classification model following a “Bag of Covariance Descriptors” paradigm in order to distinguish three different nodule tissue types in CT: solid, ground-glass opacity (GGO), and healthy. Classification accuracy is estimated based on an acquired dataset of 95 patients with manually delineated ground truth by radiology specialists in 3D. The promising outcomes of the presented method support a future aim for automated lung nodule detection and computerized diagnosis assistance applications.
Divide the examined window into cells (e.g. 16x16 pixels for each cell).
2- For each pixel in a cell, compare the pixel to each of its 8 neighbors (on its left-top, leftmiddle,
left-bottom, right-top, etc.). Follow the pixels along a circle, i.e. clockwise or counterclockwise.
3- Where the center pixel's value is greater than the neighbor's value, write "1". Otherwise,
write "0". This gives an 8-digit binary number (which is usually converted to decimal for
convenience).
4- Compute the histogram, over the cell, of the frequency of each "number" occurring (i.e.,
each combination of which pixels are smaller and which are greater than the center).
Cancerous lung nodule detection in computed tomography imagesTELKOMNIKA JOURNAL
Diagnosis the computed tomography images (CT-images) is one of the images that may take a lot of time in diagnosis by the radiologist and may miss some of cancerous nodules in these images. Therefore, in this paper a new novel enhancement and detection cancerous nodule algorithm is proposed to diagnose a CT-images. The novel algorithm is divided into three main stages. In first stage, suspicious regions are enhanced using modified LoG algorithm. Then in stage two, a potential cancerous nodule was detected based on visual appearance in lung. Finally, five texture features analysis algorithm is implemented to reduce number of detected FP regions. This algorithm is evaluated using 60 cases (normal and cancerous cases), and it shows a high sensitivity in detecting the cancerous lung nodules with TP ration 97% and with FP ratio 25 cluster/image.
Automatic Segmentation of Brachial Artery based on Fuzzy C-Means Pixel Clust...IJECEIAES
Automatic extraction of brachial artery and measuring associated indices such as flow-mediated dilatation and Intima-media thickness are important for early detection of cardiovascular disease and other vascular endothelial malfunctions. In this paper, we propose the basic but important component of such decision-assisting medical software development – noise tolerant fully automatic segmentation of brachial artery from ultrasound images. Pixel clustering with Fuzzy C-Means algorithm in the quantization process is the key component of that segmentation with various image processing algorithms involved. This algorithm could be an alternative choice of segmentation process that can replace speckle noise-suffering edge detection procedures in this application domain.
A novel CAD system to automatically detect cancerous lung nodules using wav...IJECEIAES
A novel cancerous nodules detection algorithm for computed tomography images (CT-images) is presented in this paper. CT-images are large size images with high resolution. In some cases, number of cancerous lung nodule lesions may missed by the radiologist due to fatigue. A CAD system that is proposed in this paper can help the radiologist in detecting cancerous nodules in CT- images. The proposed algorithm is divided to four stages. In the first stage, an enhancement algorithm is implement to highlight the suspicious regions. Then in the second stage, the region of interest will be detected. The adaptive SVM and wavelet transform techniques are used to reduce the detected false positive regions. This algorithm is evaluated using 60 cases (normal and cancerous cases), and it shows a high sensitivity in detecting the cancerous lung nodules with TP ration 94.5% and with FP ratio 7 cluster/image.
Segmentation of Lung Lobes and Nodules in CT Imagessipij
The objective of this paper is to develop a segmentation system in order to assist the surgeons to remove the portion of lung for the treatment of certain illness such as lung cancer, and tumours. The fissures of lung lobes are not seen by naked eyes in low dose CT image, there is a proposal for automatic segmentation system. The lung lobes and nodules in CT image are segmented using two stage approaches such as modified adaptive fissure sweep and adaptive thresholding. Initially pre-processing is used to remove the noise present in CT image using filter, then the fissure regions are located using adaptive fissure sweep technique, then histogram equalization and region growing is applied to refine the oblique fissure. Lung Nodules are segmented using thresholding. The comparative analysis of manual and automatic segmentation for fissure verification has been performed statistically. The analysis is made on 20 set of images.
Contourlet Transform Based Method For Medical Image DenoisingCSCJournals
Noise is an important factor of the medical image quality, because the high noise of medical imaging will not give us the useful information of the medical diagnosis. Basically, medical diagnosis is based on normal or abnormal information provided diagnose conclusion. In this paper, we proposed a denoising algorithm based on Contourlet transform for medical images. Contourlet transform is an extension of the wavelet transform in two dimensions using the multiscale and directional filter banks. The Contourlet transform has the advantages of multiscale and time-frequency-localization properties of wavelets, but also provides a high degree of directionality. For verifying the denoising performance of the Contourlet transform, two kinds of noise are added into our samples; Gaussian noise and speckle noise. Soft thresholding value for the Contourlet coefficients of noisy image is computed. Finally, the experimental results of proposed algorithm are compared with the results of wavelet transform. We found that the proposed algorithm has achieved acceptable results compared with those achieved by wavelet transform.
MEDICAL IMAGE PROCESSING METHODOLOGY FOR LIVER TUMOUR DIAGNOSISijsc
Apply the Image processing techniques to analyse the medical images may assist medical professionals as well as patients, especially in this research apply the algorithms to diagnose the liver tumours from the abdominal CT image. This research proposes a software solution to illustrate the automated liver
segmentation and tumour detection using artificial intelligent techniques. Evaluate the results of the liver segmentation and tumour detection, in-cooperation with the radiologists by using the prototype of the proposed system. This research overcomes the challenges in medical image processing. The 100 samples
collected from ten patients and received 90% accuracy rate.
Medical Image Processing Methodology for Liver Tumour Diagnosis ijsc
Apply the Image processing techniques to analyse the medical images may assist medical professionals as well as patients, especially in this research apply the algorithms to diagnose the liver tumours from the abdominal CT image. This research proposes a software solution to illustrate the automated liver segmentation and tumour detection using artificial intelligent techniques. Evaluate the results of the liver segmentation and tumour detection, in-cooperation with the radiologists by using the prototype of the proposed system. This research overcomes the challenges in medical image processing. The 100 samples collected from ten patients and received 90% accuracy rate.
Lung Disease Classification Using Support Vector MachineIJTET Journal
Abstract— Classification plays a vital role in disease detection and diagnosis. Classification of lung diseases is an important part for disease diagnosis. It assists diagnosis of disease with greater efficiency. Here Computed tomography (CT) images of lung diseases are classified. In this data mining classification algorithm, support vector machine (SVM) is to be optimized using ant colony optimization (ACO) algorithm. The feature of the CT scan image is extracted using wavelet transformation and the moment invariants, it is believed that it will provide a better output for classification. The Further principle component analysis also provides reduced dimensionality of image it is an added advantage for efficient classification. This optimized svm will provide a better classification accuracy.
Lung Disease Classification Using Support Vector MachineIJTET Journal
Abstract— Classification plays a vital role in disease detection and diagnosis. Classification of lung diseases is an important part for disease diagnosis. It assists diagnosis of disease with greater efficiency. Here Computed tomography (CT) images of lung diseases are classified. In this data mining classification algorithm, support vector machine (SVM) is to be optimized using ant colony optimization (ACO) algorithm. The feature of the CT scan image is extracted using wavelet transformation and the moment invariants, it is believed that it will provide a better output for classification. The Further principle component analysis also provides reduced dimensionality of image it is an added advantage for efficient classification. This optimized svm will provide a better classification accuracy.
Comparative analysis of edge based and region based active contour using leve...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Comparative analysis of edge based and region based active contour using leve...eSAT Journals
Abstract Detection of Liver cancer from CT images is an exigent task due to the reason that cancer impression in CT images are of very low in contrast and have indistinguishable edges. Indistinguishable edges are edges in which foreground and background are almost same. Image segmentation is used to extract desired anatomical structure from image. Image segmentation is the process of dividing the image into multiple regions. These regions are sometimes called region of interest (ROI). These ROI’s are used as informative inputs to further image processing e.g. feature extraction, selection and ultimately the classification of a disease. Thus an effective image segmentation is utmost important in medical images. In case of indistinguishable edges most segmentation techniques fails to detect edges. Edge based and region based active contour methods are most prevalent for image segmentation. Edge based technique works using gradient function and ultimately stopping function to detect edges , while region based uses average information inside and outside regions to control evolution and termination at edges. In this paper comparative analysis of edge based and region based active contour using level sets is done. When applying these methods on the CT images with an impression of liver cancer, it has been found that the edge based contour able to locate the desired edges more accurately. The quantitative and qualitative results comparison between two techniques has also been done. Results shows that edge based methods performs comparatively better than region based active contour using level set if number of iterations are controlled properly. Index Terms: Level Sets, Gradient, Stopping function, Active contours and Liver cancer.
Techniques for detection of solitary pulmonary nodules in human lung and thei...IJCI JOURNAL
Lung cancer is proving to be a catastrophic threat to the mankind and is main cause of deaths among other cancer related casualties. The presence of solitary pulmonary nodules in human lungs in the form of benign or malignant determines the gravity of lung ailment. This survey focusses on different techniques used to detect and classify the lung nodules which in turn will assist the domain experts for better diagnosis. Among many imaging modalities Computed Tomography (CT) being the most sought after because of its high resolution, isotropic acquisition which helps in locating the lung lesions. Since the volume of the CT scans are very large, Computer Aided Detection/Diagnosis (CAD/x) has more advantages
in addition to manual interpretation with respect to speed and accuracy. This paper attempts to summarize
various methods that have been proposed by several authors over the years of their research.
Power System State Estimation - A ReviewIDES Editor
The aim of this article is to provide a comprehensive
survey on power system state estimation techniques. The
algorithms used for finding the system states under both static
and dynamic state estimations are discussed in brief. The
authors are opinion that the scope of pursuing research in the
area of state estimation with PMU and SCADA measurements
is the state of the art and timely.
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
Reactive Power Planning is a major concern in the
operation and control of power systems This paper compares
the effectiveness of Evolutionary Programming (EP) and
New Improved Differential Evolution (NIMDE) to solve
Reactive Power Planning (RPP) problem incorporating
FACTS Controllers like Static VAR Compensator (SVC),
Thyristor Controlled Series Capacitor (TCSC) and Unified
power flow controller (UPFC) considering voltage stability.
With help of Fast Voltage Stability Index (FVSI), the critical
lines and buses are identified to install the FACTS controllers.
The optimal settings of the control variables of the generator
voltages,transformer tap settings and allocation and parameter
settings of the SVC,TCSC,UPFC are considered for reactive
power planning. The test and Validation of the proposed
algorithm are conducted on IEEE 30–bus system and 72-bus
Indian system.Simulation results shows that the UPFC gives
better results than SVC and TCSC and the FACTS controllers
reduce the system losses.
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
Damping of power system oscillations with the help
of proposed optimal Proportional Integral Derivative Power
System Stabilizer (PID-PSS) and Static Var Compensator
(SVC)-based controllers are thoroughly investigated in this
paper. This study presents robust tuning of PID-PSS and
SVC-based controllers using Genetic Algorithms (GA) in
multi machine power systems by considering detailed model
of the generators (model 1.1). The effectiveness of FACTSbased
controllers in general and SVC-based controller in
particular depends upon their proper location. Modal
controllability and observability are used to locate SVC–based
controller. The performance of the proposed controllers is
compared with conventional lead-lag power system stabilizer
(CPSS) and demonstrated on 10 machines, 39 bus New England
test system. Simulation studies show that the proposed genetic
based PID-PSS with SVC based controller provides better
performance.
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
This paper presents the need to operate the power
system economically and with optimum levels of voltages has
further led to an increase in interest in Distributed
Generation. In order to reduce the power losses and to improve
the voltage in the distribution system, distributed generators
(DGs) are connected to load bus. To reduce the total power
losses in the system, the most important process is to identify
the proper location for fixing and sizing of DGs. It presents a
new methodology using a new population based meta heuristic
approach namely Artificial Bee Colony algorithm(ABC) for
the placement of Distributed Generators(DG) in the radial
distribution systems to reduce the real power losses and to
improve the voltage profile, voltage sag mitigation. The power
loss reduction is important factor for utility companies because
it is directly proportional to the company benefits in a
competitive electricity market, while reaching the better power
quality standards is too important as it has vital effect on
customer orientation. In this paper an ABC algorithm is
developed to gain these goals all together. In order to evaluate
sag mitigation capability of the proposed algorithm, voltage
in voltage sensitive buses is investigated. An existing 20KV
network has been chosen as test network and results are
compared with the proposed method in the radial distribution
system.
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
Controlling power flow in modern power systems
can be made more flexible by the use of recent developments
in power electronic and computing control technology. The
Unified Power Flow Controller (UPFC) is a Flexible AC
transmission system (FACTS) device that can control all the
three system variables namely line reactance, magnitude and
phase angle difference of voltage across the line. The UPFC
provides a promising means to control power flow in modern
power systems. Essentially the performance depends on proper
control setting achievable through a power flow analysis
program. This paper presents a reliable method to meet the
requirements by developing a Newton-Raphson based load
flow calculation through which control settings of UPFC can
be determined for the pre-specified power flow between the
lines. The proposed method keeps Newton-Raphson Load Flow
(NRLF) algorithm intact and needs (little modification in the
Jacobian matrix). A MATLAB program has been developed to
calculate the control settings of UPFC and the power flow
between the lines after the load flow is converged. Case studies
have been performed on IEEE 5-bus system and 14-bus system
to show that the proposed method is effective. These studies
indicate that the method maintains the basic NRLF properties
such as fast computational speed, high degree of accuracy and
good convergence rate.
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
The size and shape of opening in dam causes the
stress concentration, it also causes the stress variation in the
rest of the dam cross section. The gravity method of the analysis
does not consider the size of opening and the elastic property
of dam material. Thus the objective of study is comprises of
the Finite Element Method which considers the size of
opening, elastic property of material, and stress distribution
because of geometric discontinuity in cross section of dam.
Stress concentration inside the dam increases with the opening
in dam which results in the failure of dam. Hence it is
necessary to analyses large opening inside the dam. By making
the percentage area of opening constant and varying size and
shape of opening the analysis is carried out. For this purpose
a section of Koyna Dam is considered. Dam is defined as a
plane strain element in FEM, based on geometry and loading
condition. Thus this available information specified our path
of approach to carry out 2D plane strain analysis. The results
obtained are then compared mutually to get most efficient
way of providing large opening in the gravity dam.
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
Pushover Analysis a popular tool for seismic
performance evaluation of existing and new structures and is
nonlinear Static procedure where in monotonically increasing
loads are applied to the structure till the structure is unable
to resist the further load .During the analysis, whatever the
strength of concrete and steel is adopted for analysis of
structure may not be the same when real structure is
constructed and the pushover analysis results are very sensitive
to material model adopted, geometric model adopted, location
of plastic hinges and in general to procedure followed by the
analyzer. In this paper attempt has been made to assess
uncertainty in pushover analysis results by considering user
defined hinges and frame modeled as bare frame and frame
with slab modeled as rigid diaphragm and results compared
with experimental observations. Uncertain parameters
considered includes the strength of concrete, strength of steel
and cover to the reinforcement which are randomly generated
and incorporated into the analysis. The results are then
compared with experimental observations.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
The recent advancements in the wireless technology
and their wide-spread deployment have made remarkable
enhancements in efficiency in the corporate and industrial
and Military sectors The increasing popularity and usage of
wireless technology is creating a need for more secure wireless
Ad hoc networks. This paper aims researched and developed
a new protocol that prevents wormhole attacks on a ad hoc
network. A few existing protocols detect wormhole attacks but
they require highly specialized equipment not found on most
wireless devices. This paper aims to develop a defense against
wormhole attacks as an Anti-worm protocol which is based on
responsive parameters, that does not require as a significant
amount of specialized equipment, trick clock synchronization,
no GPS dependencies.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
The main tasks of a Wireless Sensor Network
(WSN) are data collection from its nodes and communication
of this data to the base station (BS). The protocols used for
communication among the WSN nodes and between the WSN
and the BS, must consider the resource constraints of nodes,
battery energy, computational capabilities and memory. The
WSN applications involve unattended operation of the network
over an extended period of time. In order to extend the lifetime
of a WSN, efficient routing protocols need to be adopted. The
proposed low power routing protocol based on tree-based
network structure reliably forwards the measured data towards
the BS using TDMA. An energy consumption analysis of the
WSN making use of this protocol is also carried out. It is
found that the network is energy efficient with an average
duty cycle of 0:7% for the WSN nodes. The OmNET++
simulation platform along with MiXiM framework is made
use of.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
This paper presents a trifocal Rotman Lens Design
approach. The effects of focal ratio and element spacing on
the performance of Rotman Lens are described. A three beam
prototype feeding 4 element antenna array working in L-band
has been simulated using RLD v1.7 software. Simulated
results show that the simulated lens has a return loss of –
12.4dB at 1.8GHz. Beam to array port phase error variation
with change in the focal ratio and element spacing has also
been investigated.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
A microelectronic circuit of block-elements
functionally analogous to two hydrogen bonding networks is
investigated. The hydrogen bonding networks are extracted
from â-lactamase protein and are formed in its active site.
Each hydrogen bond of the network is described in equivalent
electrical circuit by three or four-terminal block-element.
Each block-element is coded in Matlab. Static and dynamic
analyses are performed. The resultant microelectronic circuit
analogous to the hydrogen bonding network operates as
current mirror, sine pulse source, triangular pulse source as
well as signal modulator.
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
In this paper a method is proposed to discriminate
real world scenes in to natural and manmade scenes of similar
depth. Global-roughness of a scene image varies as a function
of image-depth. Increase in image depth leads to increase in
roughness in manmade scenes; on the contrary natural scenes
exhibit smooth behavior at higher image depth. This particular
arrangement of pixels in scene structure can be well explained
by local texture information in a pixel and its neighborhood.
Our proposed method analyses local texture information of a
scene image using texture unit matrix. For final classification
we have used both supervised and unsupervised learning using
K-Nearest Neighbor classifier (KNN) and Self Organizing
Map (SOM) respectively. This technique is useful for online
classification due to very less computational complexity.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.