Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Enhancing Informative Frame Filtering By Water And Bubble Detection In Colonoscopy Videos, Ashok Dahal, Junghwan Oh, Wallapak Tavanapong, Johnny S. Wong, Piet C. De Groen Jun 2017

Enhancing Informative Frame Filtering By Water And Bubble Detection In Colonoscopy Videos, Ashok Dahal, Junghwan Oh, Wallapak Tavanapong, Johnny S. Wong, Piet C. De Groen

Johnny Wong

Colonoscopy has contributed to a marked decline in the number of colorectal cancer related deaths. However, recent data suggest that there is a significant (4-12%) miss-rate for the detection of even large polyps and cancers. To address this, we have been investigating an ‘automated feedback system’ which informs the endoscopist of possible sub-optimal inspection during colonoscopy. A fundamental step of this system is to distinguish non-informative frames from informative ones. Existing methods for this cannot classify water/bubble frames as non-informative even though they do not carry any useful visual information of the colon mucosa. In this paper, we propose a …


Modification In Weighted Clustering Algorithm For Faster Clustering Formation By Considering Absolute Attributes Of Mobile Nodes And Greedy Method For Role Selection Of Mobile Nodes In Manet, Vijayanand Kumar, Rajesh Kumar Yadav Dec 2015

Modification In Weighted Clustering Algorithm For Faster Clustering Formation By Considering Absolute Attributes Of Mobile Nodes And Greedy Method For Role Selection Of Mobile Nodes In Manet, Vijayanand Kumar, Rajesh Kumar Yadav

Innovative Research Publications IRP India

Wirelessly allocated mobile nodes which are configured in a geographically adjacent to each other can form cluster by applying rules on the mobile nodes. Each cluster family have different members with different assigned roles such as cluster head, cluster members, gateway members and ordinary nodes which can perform roles of any three mentioned roles as the time progresses based on absolute and relative attribute information. Absolute attributes of mobile nodes can be mobility, energy consumed and entropy of the mobile node. Relative attributes can be considered as neighbour information and sum of distances of neighbours etc. Relative attributes are the …


Relaxing Weighted Clustering Algorithm For Reduction Of Clusters And Cluster Head, Vijayanand Kumar Sep 2015

Relaxing Weighted Clustering Algorithm For Reduction Of Clusters And Cluster Head, Vijayanand Kumar

Innovative Research Publications IRP India

Adhoc clustering in MANET is to divide mobile nodes into different virtual groups. Mobile nodes are allocated geographically adjacent in the cluster. Clustering is done by some rule specific in the network. In this paper, we have concentrated to modify weight based clustering algorithm to improve the performance in this wireless technology. By slight improvement in existing weight based clustering algorithm [1] reduction in cluster as well as cluster head can be observed through experiment. Proposed Algorithm specifies relaxing the weight criteria for isolated cluster head nodes in range of other cluster head as well as reconsidering the nodes in …


Clusid: A Clustering Scheme For Intrusion Detection, Improved By Information Theory, R. Shokri, Farhad Oroumchian, N. Yazdani Jul 2010

Clusid: A Clustering Scheme For Intrusion Detection, Improved By Information Theory, R. Shokri, Farhad Oroumchian, N. Yazdani

Farhad Oroumchian

Security is a big issue for all networks in any enterprise environment. Many solutions have been proposed to secure the network infrastructure and communication over the Internet. Intrusion Detection Systems with many different techniques such as data mining approaches are employed to maximize the detection rate of intrusions while reducing false alarm rate. For instance, many clustering techniques are recommended which segregate normal and abnormal data in IDSs. Clustering methods put emphasis on finding differences and similarities of traffic sessions to categorize each one in its corresponding groups. These groups are represented by their assigned labels. Later, these labels are …