Version-3 (Nov-Dec 2016)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Image Denoising with Wavelet Based Thresholding |
Country | : | India |
Authors | : | P.C.V.Amulya || Sai Vijaya Lakshmi |
Abstract: Image processing is a field that continues to grow, with new applications being developed at an ever increasing pace. Image Denoising is an important part of image processing and computer vision problems. The important property of a good image denoising model is that it should completely remove noise as far as possible. One of the most powerful and perspective approaches in this area is image denoising using discrete wavelet transform (DWT). As number of levels increased, Peak Signal to Noise Ratio (PSNR) of image gets and Mean Square Error (MSE) get increased . The simulation results reveal that wavelet based method outperforms other methods.
Keywords: Image Demising, Discrete Wavelet Transform.
[1]. Snehal O.Mundhada,prof.V.K.Sandilya, "Image enhancement and its various techiques ",," International Journal of Engineering and Advanced Reasearch in computer science and Software Engineering,volume 2, Issue4, ISSN: 2277 128X.
[2]. Goa Qniqing, Zeng guangping ; Chen Dexin ;He ketai," Image enhancement based on improved PSO algorithm",Industrial
Electronics and Applications (ICIEA),2011 6th IEEE conference on,21-23 june 2011,pp:234-238.
[3]. P.R.Pawar ,DR.V.VPATIL,"Evaluation of HVS based Image enhancement Technique for Noisy Images ",International Journal of Innovative research in science,Engineering and
[4]. Rajni, Anutam, "Image Denoising Techniques –An Overview," International Journal of Computer Applications (0975-8887), Vol. 86, No.16, January 2014.
[5]. Akhilesh Bijalwan, Aditya Goyal and Nidhi Sethi, "Wavelet Transform Based Image Denoise Using Threshold Approaches,"
International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249-8958, Vol.1, Issue 5, June 2012..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Using Pattern Matching To Minimize Manual Processes in Assessment Administration |
Country | : | Kenya |
Authors | : | Kavindu Augustine Mbii || Dr. Agnes Mindila, Phd || Prof. Waweru Mwangi, Phd |
Abstract: Both the Kenya National ICT master plan 2014 – 2018 and vision 2030 placed ICT, Education and Training sectors as key pillars to attaining economic and social stability. Sessional paper No. 1 of 2005 stated that Information and Communication Technology had a direct role to play in education and if appropriately used, ICT could bring many benefits to the education and training sector in general. This research seeks touse ICTs to reduce manual processes in assessment administration by introducing an agent that matches an answer provided by the trainee in a question to phrases of patterns...............
Keywords: Pattern Matching, Essay Questions Marking, NaturalLanguage Processing
[1] Adam Retter, Web Applications and XML Technologies, Exist solutions, 2011
[2] Akinul Islam Jony, Analysis of Multiple String Pattern Matching Algorithms, Technical University of Munich, 2014.
[3] B. W. Watson and G. Zwaan. A taxonomy of sublinear multiple keyword pattern Matching algorithms. Science of Computer Programming, 27(2):85–118, 1996.
[4] Bell, J. Doing your research project. Buckingham, England: Open University. 1996
[5] Bernard Marr, Big data: using smart big data, analytics and metrics to make better decisions and improve performance, John Wiley and Sons, Inc., 2015
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comprehending the Concept of Information Technology using its Facilities by University Students (a study on the Sudanese Jordanian College Students for 2015 at Information Technology and Engineering Software Sections - first Year Grade) |
Country | : | Sudan |
Authors | : | Dr.Huthaifa A.A Ellatif |
Abstract: The paper discussedthe term ofInformation Technology (IT), which is most commonly used term, the IT has assumed anoutstandingclass in contemporary societies and overlapped in all the details of life, becamea cause of the civilization of peoples and the progress of nations.This paper alsodiscussed the problem of lack of comprehending the concept of information technology by the university students and worked to find the reasons, a studyhad been conducted by distributing a questionnaire to a random sample of university students.The distinguished results showed that the lack of an appropriate environment and the lack of technological infrastructure in the community and Universities are the reason behind the lack of students' comprehending the importance ofusing information technology, as well.............
Keywords:Technology, Information, Information Technology.
[1]. Prof. Eng Dr.Aadil Talib, Dr.Maidah Ali Jassim, use and employ information technology in distance education, Journal of Baghdad College of Economic Sciences University, No. -26-.2011.
[2]. Heba Mudesir Mohammadayn Ahmed, elements of information and communication technology community (Sudan case study), University of Khartoum, Faculty of Arts 2007.
[3]. Emad Khtmi Mohammed, the reality of industrial information in Sudan, the Ministry of Industry Sudan 2009.
[4]. Emad Khtmi Mohammed, industrial information, Directorate General for Industrial Information, Ministry of Industry Sudan 2011.
[5]. Eng. Haidar Shakir Noori, lectures in information technology subject, College of Management and Economics University of Diyala.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Impact of Using SMS Alert-Based E-Health in Increasing Outpatients Access to Health Care Resources in Nigeria |
Country | : | Nigeria |
Authors | : | G.S Nwankwo || Prof. H.C Inyama || Dr. C.O Ohanaeme || Engr. F.E.Ozi |
Abstract: Electronic-health with Short Message Servicebased alert system designed and developed in the course of the Research workis to increase the access to Health Care Providers by the Outpatients. The system has 3modules namely: the web application subsystem which serves as theinteractive GUI(front end) for inputs were developed using Visual Basic.NETIDEin line with Waterfall Methodology. The database(back end) was designed using MSSQL which handles the system data services. The Web Service of SMSLive247.NET connectivity API used for SMS gateway sends alerting messages to patients or doctors for service availability. The hosting of the web-based app in www.appsgility.com.ng is to make it accessiblethereby providing health servicesany time around theclock through internet connection. Theexperimental results of using the system in accessing health services indicated thatmore number of outpatients accessede-health services from more doctorsfrom different geographical locations in Nigeria
Keywords:Accessing Health Care, e-Health, Primary Health Services, Outpatients, SMS, Outpatients
[1]. Michael Millman (1993). Access to health care in America. National Academies Press (1993). Retrieved from http://www.nap.edu/read/2009/chapter/1(Accessed on 15 January, 2015)
[2]. Geissbuhler A, Al-ShorbajiN(2012). Establishing an evidence-base for e-health. Bull World Health Organ 2011; Vol 89 (pp.394-2471) Retrievedfromhttp://www.who.int/bulletin/volume/89/6/11-090274.pdf(Accessed June 2013) [3]. OlumuyiwaOdusanya(2013).Why Nigeria needs e-Health to improve care delivery. news-www.dailyindependentnig.com.May 5, 2013. Retrieved from http://dailyindependentnig.com/2013/05/why-nigeria-needs-e-health-to-improve-care-delivery/.(AccessedJune 2013). [4]. AndrouchkoL(2003). What is telemedicine/e- health? telehealth? Workshop on Standardization in E-health Geneva, 23-25 May 2003 rapporteur, q14 1/2, itu-d sg 2Retrieved from http://www.itu.int/itudoc/itu-t/workshop/e-health/s0-01.pdf (Accessed June 2013) [5]. Anselm Adodo(2013), Traditional medicine and healthcare in Nigeria, which way forward? Retrieved from http://thenationonlineng.net/traditional-medicine-and healthcarein-nigeria-which-way-forward/. (Accessed Thursday, 05 September 2013).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Online Voter id Generation with Online Voting System and Result Generation at an Instance of Time |
Country | : | India. |
Authors | : | Bhuvanapriya.R || Rozil banu.S || Sivapriya.P || Kalaiselvi.V.K.G |
Abstract: The main objective of the democracy is "vote" by which the people can elect the candidates for forming an efficient government to satisfy their needs and requests such that their standard living can be improved. In developing countries like "INDIA" the election commission follows manual voting mechanism which is done by electronic voting machine. This machine is placed in the poll booth centre and is monitored by higher officials. Due to some illegal activities the polling centre are misused and people's vote to right has been denied. This seldom occurs in rural areas as well as in urban cities because the educated people are not interested in casting their votes to candidates who represent their respective areas. To ensure 100% voting automation came into play. But this automated system have been approved only on some developed countries since security have not been ensured to a large extent
Keywords:Vote, electronic voting machine, aadhar card, voter id
[1]. Benaloh, J. & Tuinstra, D. (1994) "Receipt-free Secret-Ballot Elections", In Proceedings
[2]. Of the 26th ACM Symposium on Theory of Computing (STOC'94), Montreal, Canada, pp. 544-553.
[3]. Benoit, D. K. (2004) Experience with voting overseas. Appendix 2J to the first report of
[4]. Ireland's Commission on Electronic Voting,
[5]. Brennock, M. (2004) Cabinet to press ahead on e-voting in EU and local polls. The Irish Times.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhance Security in Multi-Clouds by Using Secret Sharing Algorithm |
Country | : | India. |
Authors | : | M. Tulasi Rama || A. Madhuri |
Abstract: Cloud computing is convenient and on-demand computing. Cloud computing provides Storing, retrieving and processing of resources and data in a cloud environment. Cloud computing provides several service models and deployment models. These features will help provide outsourcing the data with third party storage service providers. The storage provider must assure that the data stored by the user is secure. Data encryptions, hemimorphic encryption, secret sharing algorithms are the techniques extensively used as securing data outsourcing. Single cloud computing provides fast access to their applications and services. But due to some reason, that single cloud suffers from many security issues, users and customers are opting "multi-cloud" is also called inter-clouds" and "cloud of clouds". These multi-clouds are secured by using various techniques and algorithms. This paper applies secret sharing algorithm to secure data outsourcing...........................
Keywords: Cloud computing, Data Encryption, Hemimorphic Encryption, Secret Sharing Algorithm, Single cloud, Cloud of Clouds, Inter-Clouds, Multi-Cloud, Techniques
[1]. (NIST), http://www.nist.gov/itl/cloud/.
[2]. I. Abraham, G. Chockler, I. Keidar and D. Malkhi, "Byzantine disk paxos: optimal resilience with Byzantine shared memory", Distributed Computing, 18(5), 2006, pp. 387-408.
[3]. H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, "RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st ACM symposium on Cloud computing, 2010, pp. 229-240.
[4]. D. Agrawal, A. El Abbadi, F. Emekci and A. Metwally, "Database Management as a Service: Challenges and Opportunities", ICDE'09:Proc.25thIntl. Conf. on Data Engineering, 2009, pp. 1709-1716.
[5]. M.A. AlZain and E. Pardede, "Using Multi Shares for Ensuring Privacy in Database-as-a-Service", 44th Hawaii Intl. Conf. on System Sciences (HICSS), 2011, pp. 1-9.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Apriori Algorithm for Surgical Consumable Material Standardization |
Country | : | Indonesia. |
Authors | : | Christoforus Yohannes || Indrabayu || Ingrid Nurtanio || Reza Maulana || Intan Sari Areni || Elly Warni |
Abstract: Medical Surgical is an activity with zero mistake due to the slightest mistake in a surgery will not be tolerated in terms of medical, law and humanity. Surgical success would be determined by pre-surgical preparation, wherein each operating room personnel or the surgeon is required to accurately prepare everything to avoid delay in surgery. Therefore, the data mining system to determine the standardization of consumable material on surgery is required. In this study, Apriori algorithm is used to resolve the issue. The results obtained show that the Apriori algorithm can be applied in order to standardize the use of consumables material in the surgical unit
Keywords:Apriori Algorithm, Hospital, Surgery, Association Rule, Data mining.
[1]. Abdullah, A., Deris, S., Mohamad, M. and Hashim, S. (2012). A new hybrid firefly algorithm for complex and nonlinear problem. Distributed Computing and Artificial Intelligence, Springer Berlin Heidelberg, pp.673--680.
[2]. Apostolopoulos, T. and Vlachos, A. (2010). Application of the firefly algorithm for solving the economic emissions load dispatch problem. International Journal of Combinatorics, 2011.
[3]. Dexter, F., A. Makario. (2002). Changing allocations of operating room time from a system based on historical utilization to one where the aim is to schedule as many surgical cases as possible, anesth Analg.
[4]. Erwin,. (2009). Market Basket Analysis with Apriori Algorithm. FP-Growth, Generic Journal,24,pp.26--30. [Indonesian]
[5]. Liana, Duta. (1996). Factors associated with the delay in the installation of surgery surgical center in RSUPN Dr. Cipto Mangunkusumo, Postgraduate Programme Universitas Indonesia. [Indonesian]
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Interference Mitigation Approach for WBAN by Improving RAKE Receiver Modulation |
Country | : | India. |
Authors | : | Mainak Chakraborty || Suparna Biswas |
Abstract: In Wireless Body Sensor Network in order to diminish the interference caused by interpersonal communication and avoiding packet overhead collision problem in data link layer and MAC layer we propose a rake receiver to be implemented in body sensor network and improving the modulation techniques. Rake recovers are widely accepted because of its efficiency to remove near far problem. Moreover in recent research works encompassing the wireless sensor body area network highlights that body sensor intermediate control nodes are not immune to noise elimination and data reshaping. Most of the data exchanged between these nodes gets lost due to this problem and maintenance cost of the entire network boosts up due to power loss and regeneration. In the proposed Rake receiver architecture the body sensor is allowed to be kept in optimized size balancing the power loss, performance and circuit complexity...........
Keywords:WBAN, QPSK, MAC layer, Bit Error Rate, Signal to Noise Ratio
[1] Baldonado, M., Chang, C.-C.K., Gravano, L., Paepcke, A.: The Stanford Digital Library Metadata Architecture. Int. J. Digit. Libr. 1 (1997) 108–121
[2] D. Jea and M. B. Srivastava, "A remote medical monitoring and interaction system," Proceedings of the 4th International Conference on Mobile Systems, Applications, and Services (MobiSys '06), Uppsala,Sweden, June 2006.
[3] Morchon, O.G, Baldus H, Sanchez, D.S, 3-5, "Resource Efficient Security for Medical Body Sensor Networks, Wearable and Implantable Body Sensor Networks", BSN International Workshop,4pp, April 2006.
[4] N. F. Timmons and W. G. Scanlon, "Analysis of the performance of IEEE 802.15.4 for medical sensor body area networking," in Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON 2004),October 2004, pp. 16–24
[5] Interference Mitigation Between WBAN Equipped Patients by Judhistir Mahapatro , Sudip Misra, Nabiul Islam,IEEE
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of Soil condition Based on pH value Using Classification Techniques |
Country | : | India. |
Authors | : | Mrs. N. Hemageetha || Dr. G.M. Nasira |
Abstract: Agriculture is the backbone of developing countries. . Soil analysis is useful for farmers to determine which type of crops to be cultivated in a particular type of soil. Analyzing soil will prove to be a major benefit to the farmers. This paper analyzes whether the Salem district soil is suitable soil or non suitable soil for crops cultivate on based on pH value using data mining classification techniques.
Keywords: Agricultural Soil, Bayesian networks, Data mining, Naive Bayes , Jrip, J48
[1]. Mucherino.A, Petraq Papajorgji and P.M.Pardalos,A survey of data mining techniques applied to agriculture, Published online 2009 © Springer-verlag.
[2]. R.Santhi et at (2014) ,GIS based Soil map for salem district of Tamilnadu. TechInical Folder, TNAU,Coimbatore.
[3]. Dr. G.M. Nasira , N. Hemageetha ,Perspective on Classification Techniques in Agriculture, ,International Journal of Computing Technology and Information Security Vol.1, No.2, pp. 40-46 , December, 2011. ISSN: 2231-1998 © 2011. www.ijctis
[4]. Dr. G.M. Nasira , N. Hemageetha, Vegetable price prediction using data mining classification technique, Preceedings of the International Conference on pattern Recognition, Informatics and Medical Engineering (PRIME 2012), PP. 99-102 ISBN No:978-1-4673-1038-3. © 2012 IEEE.
[5]. Dr. G.M. Nasira , N. Hemageetha, Forecasting Model for Vegetable Price Using Back Propagation Neural Network, International Journal of Computational Intelligence and Informatics, Vol 2, no.2 sep 2012 PP 110-115.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Artificial Neural Networks in Data Mining |
Country | : | Egypt |
Authors | : | Nashaat El-Khamisy Mohamed || Ahmed Shawky Morsi El-Bhrawy |
Abstract: There are plenty of technologies available to data mining practitioners, including Artificial Neural Networks, Regression, and Decision Trees. Data mining tools can forecast the future trends and activities to support the decision of Officials. Some data mining tools can also solve some traditional problems which consumed enough time, this is because that they can rapidly browse the entire database and find some useful information experts undetected. Neural network is a parallel processing network which made with simulating the intuitive thinking of human, the neural network in data mining...........
Keywords: Artificial Neural Network (ANN), neural network topology, Data mining, back propagation algorithm, Advantages.
[1] M.Charles Arockiaraj , "Applications of Neural Networks In Data Mining", International Journal Of Engineering And Science, Vol.3, Issue 1 (May 2013), PP 08-11
[2] Sonalkadu, Sheetal Dhande "Effective Data Mining Through Neural Network" , International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 2, Issue 3, March 2012 ISSN: 2277 128X
[3] J.Rabunal, J.Dorado, "Artificial neural networks in real-life applications", 2006, p 297-303.
[4] Farhad Bilal Baha'addin,"Kurdistan Engineering Colleges and Using of Artificial Neural Network for Knowledge Representation in learning process",(IJEIT) Volume 3, Issue 6, December 2013, p 292:299.
[5] Mohamed M. Mostafa,"Profiling blood donors in Egypt: A neural network analysis", Volume 36, Issue 3, Part 1, April 2009, p 5031–5038.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Optimizing the Parameters of SVM with RBF Kernel for Classifying Breast Tumors in Ultrasound Images |
Country | : | India. |
Authors | : | P. K. Saranya || Dr. E. S. Samundeeswari || Dr. R. Manavalan |
Abstract: Breast cancer is one of the leading causes of death among women worldwide accounting more than 8 million deaths. The most effective way to reduce breast cancer deaths is to detect it earlier. Ultrasound imaging is found to be a real time, non-ionizing tool used mostly for early detection of breast cancer. It is an operator dependent tool, as it needs a physician to analyze the internal echo in making diagnostics decision. Computer Aided System acts as a second reader to physician to make correct diagnosis. In this work, 84 Breast Ultrasound (BUS) images are considered, and 28 morphological and 43 textural features are extracted from each image. Principal Feature Analysis...........
Keywords: Breast Ultrasound, MAVM filter, Regularized K-Means Clustering, Feature Selection, Artificial Neural Network, Support Vector Machine, Pattern Search
[1]. Ultrasoundcases. http://ultrasoundcases.info/category.aspx?cat=67. Accessed May 2014.
[2]. Saranya P K, Samundeeswari E S, Manavalan R, Noise Reduction In Breast Ultrasound Images Using Modified AVM Filter, International Journal of Informative & Futuristic Research (IJIFR), 15 December; 3(4), ISSN: 2347-1697, 2015.
[3]. Samundeeswari E S, Saranya P K, Manavalan R. Segmentation of Breast Ultrasound Image Using Regularized K-Means (ReKM) Clustering. 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), IEEE Xplore Digital Library, Sep 2016. DOI: 10.1109/WiSPNET.2016.7566362
[4]. Saranya P K, Samundeeswari E S, A Study on Morphological and Textural Features for Classifying Breast Lesion in Ultrasound Images, International Journal of Innovative Research in Science, Engineering and Technology, 2016; 5(3).
[5]. Yijuan Lu, Ira Cohen, Xiang Sean Zhou, Qi Tian, Feature Selection Using Principal Feature Analysis. ACM Multimedia, Augsburg, Germany, 2007 September; 23-29.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhancing Security of Fingerprinting Technique with Watermarking |
Country | : | India. |
Authors | : | Arpana Bharani || Dr. Jitendra Sheetlani |
Abstract: To increase the security in biometric system data there is the need to use steganography techniques with the biometric techniques. The establishment of direct personal identity is uniquely identified by using fingerprints. But fingerprints are also at risk to accidental attacks. Nowadays the most important concerns is the protection of biometric data and therefore it is gaining interest among researchers. The storing and transferring of biometric data, needs many security concerns that are sensitive and if this data is lost, counterfeited, or hacked, it may be impossible to recover..........
[1] M. Barni, F. Bartolini, V. Cappellini and A. Piva, "A DCT domain system for robust image watermarking", Signal Processing, vol. 66, no. 3, May 1998, pp. 357-372.
[2] R. Cappelli, A. Erol, D. Maio and D. Maltoni, "Synthetic fingerprint image generation", Proc. ICPR, Sept. 3-7, 2000, Barcelona, vol. 3, pp. 475-478.
[3] F. Hartung and M. Kutter, "Multimedia watermarking techniques", Proc. IEEE, vol. 87, no. 7, July 1999, pp. 1079-1107.
[4] A.K. Jain, L. Hong and S. Pankanti, "Biometric identification", Comm. ACM, vol. 43, no. 2, Feb. 2000, pp. 91-98.
[5] M. Kutter, F. Jordan and F. Bossen, "Digital signature of color images using amplitude modulation", Proc. SPIE EI, San Jose, Feb. 1997, vol. 3022, pp. 518-526.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Lung Cancer Detection and Classification with Classification Algorithms |
Country | : | Turkey |
Authors | : | Zehra Karhan || Taner Tunç |
Abstract: In this study, lung cancer was detected by looking at blood value obtained from Ondokuz Mayıs University Department of Chest Diseases. During the detection phase; classification is performed and the results were evaluated with the performance comparison between machine learning algorithms. The patient's information was used in the present data; Age, hb, wbc, neu, lymph, plt, mpv, plr, nlr. The necessary normalizations were made on our data before classification. In classification stage, k-nearest neighbors, support vector machines, naive bayes..........
Keywords: support vector machines, neural networks, k-nearest neighbor, logistic regression, naive bayes.
[1]. Konsensusu, Antakya. Akciğer Kanseri. Diss. Ġstanbul Üniversitesi, 2010.
[2]. Göksel, Tuncay, et al. "Akciğer kanseri." Türkiye‟de temel akciğer sağlığı sorunları ve çözüm önerileri. Ankara: Türk Toraks Derneği (2010): 55-70.
[3]. SERĠLMEZ, Murat, et al. "Akciğer kanserinde hematolojik parametreler." Türk Onkoloji Dergisi 25.3 (2010): 87-92.
[4]. Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine Learning, 20(3), pp. 273–297.
[5]. B. E. Boser, I. M. Guyon, and V. N. Vapnik. A training algorithm for optimal margin classifiers. In D. Haussler, editor, 5th Annual ACM Workshop on COLT, pp. 144-152, Pittsburgh, PA, 1992. ACM Press
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Soil pH Formulation by its Moisture Using Dyadic Wavelet Transform |
Country | : | India. |
Authors | : | Agnel Livingston L.G.X. || Merlin Livingston L.M. |
Abstract: This paper aims at developing a hardware module for monitoring the soil macronutrient content to achieve high yield in agricultural field. This can be done by analyzing the spectral characteristics of soil image. The acquired image is processed to obtain the dielectric properties of soil. Itis involved to find the basic properties of soil. It also revolves around to measure the pH value of the soil by retrieving the moisture content of it. To formulate this dyadic wavelet transform is being used...........
Keywords:- Dyadic wavelet transform, Filtering, Data Acquisition, Soil pH.
[1]. [1]Y.Inoueet.al.,"Analysis of Local Variation of Soil Surface Parameters With TerraSAR-X Radar Data Over Bare Agricultural
Fields" page 874-881 IEEE Trans .,vol 48-2012.
[2]. [2]S.A Tabatabaeenejadla.te"Computation of Radar Scattering From Heterogeneous Rough Soil Using the Finite-Element Method"
Pg 3461-3469 IEEE Geoscience and Remote Sensing Society ., vol 51 2008
[3]. [3]YM Aubert "Statistical characteristics of simulated radar imagery from bare soil surfaces: effects ofsurface roughness and soil
moisture variability"IEEE Transactions on Geoscience and Remote Sensing Vol:32 .,Pg 159-168 2011
[4]. [4]R.Akbar "A radar-radiometer soil moisture estimation framework with adaptive regularization and join physics"Pg 1-4 IEEE
Trans 2013
[5]. D. Entekhabi et al., "The Soil Moisture Active and Passive (SMAP)mission," Proc. IEEE, vol. 98, no. 5, pp. 704–716, 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Geo Spatial Data Hiding for Copy Right Protection Using 2x2 Block Approach |
Country | : | India. |
Authors | : | R. Anusha || M.V.S.N.Maheswar |
Abstract: As geospatial data is different from digital images, image watermarking evaluation methods cannot be directly applied to watermarked geospatial data. At present, watermarking algorithms are mainly focusing on robustness evaluation and error analysis. One of the important aspects related to vector data quality i.e. topological relationship inspection is neglected. An attempt has been made to incorporate invisible watermark in geospatial vector data using wavelet based watermarking algorithm and the resulted watermarked data has been evaluated in terms of polygon closure..........
Keywords: Geospatial data, Data quality, Watermarks.
[1]. Xia, C. Boncelet, and G. Arce, "A Multiresolution Watermark for Digital Images," Proc. IEEE Int. Conf. on Image Processing, Oct. 1997, vol. I, pp. 548-551.
[2]. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
[3]. M. Shensa, "The discrete wavelet transform: Wedding the a trous and mallat algorithms," IEEE Transactions on Signal Processing,vol. 40, no. 10, pp. 2464–2482, 1992.
[4]. Mitchell D. Swanson, Mei Kobayashi, Ahmed H. Tewfik, "Multimedia Data Embedding and Watermarking Technologies", Proceedings of the IEEE, 86(6):10641087, June 1998
[5]. F. Bartolini, M. Barni, V. Cappellini, and A. Piva, "Mask Building for Perceptually Hiding Frequency Embedded Watermarks," Proc. Int. Conf. on Image Processing, Oct. 1998, vol. I, pp. 450-454.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Challanges of Existing Mobile Applications for Health Care Management and Diet Maintanance |
Country | : | India. |
Authors | : | Anil Kuvvarapu || Dheeraj Dass Marneni || Varagiri Shailaja |
Abstract: Many mobile applications have been designed for health conditions and diet maintenance. Mobile computing holds great promise for providing effective support for helping people to manage their health in everyday life. There is a lack of evidence on extent to which these applications actually help. In addition, previous research has reported that mobile health (m-health) applications focus only on fitness, but does not provide effective results for the people by using these technologies [5]. To understand these drawbacks from the mobile applications, we conducted informal interviews with 12 participants (6 male, 6 female).This interview deals with finding problems of existing application..........
Keywords: Health Management, m-health (mobile health) application, Type of Notifications, Diet Maintenance, mobile phone short message tactile notification.
[1]. http://www.medicalnewstoday.com/articles/283117.php
[2]. http://familydoctor.org/familydoctor/en/drugs-procedures-devices/prescription-medicines/antibiotics-when-they-can-and-cant-help.html
[3]. Sung-Tsun Shih "Self healthcare management system based on RFID technology"http://ieeexplore.ieee.org/xpl/article Details.jsp?reload=true&arnumber=5967555
[4]. http://www.ingrammicro.com/ext/0,, 24305_24314_24304,00.html.
[5]. http://mhealth.jmir.org/2014/2/e19/
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A novel approach on memory less BFGS neural network training algorithm |
Country | : | India |
Authors | : | S Shoba Rani || Dr.D.Nagendra Rao || Dr.S Vatsal || R.Chennakeshavulu |
Abstract: A curvilinear algorithm [1] model is presented here for training neural networks which are based on modifications of the memory less BFGS [2] method. The method supports curvilinear [3] search. A memory quasi-Newton direction and a direction of negative curvature are described here. Additionally negative curvature [4] direction is allowed by avoiding any storage and matrix factorization. The efficiency of the training process is achieved by simulation results.
Keywords: Neural networks, memory less BFGS, negative curvature direction, curvilinear search
[1]. A.D. Anastasiadis, G.D. Magoulas, and M.N. Vrahatis. New globally convergent training scheme based on the resilient propagation algorithm. Neurocomputing, 64:253–270, 2005.
[2]. M.S. Apostolopoulou, D.G. Sotiropoulos, and P. Pintelas. Solving the quadratic trust-region subproblem in a low-memory BFGS framework. Optimization Methods and Software,23(5):651–674, 2008.
[3]. L. Armijo. Minimization of functions having Lipchitz continuous partial derivatives. Pacific Journal of Mathematics, 16:1–3, 1966.
[4]. J. Barzilai and J.M. Borwein. Two point step size gradient methods. IMA Journal of Numerical Analysis, 8:141–148, 1988.
[5]. R. Battiti. First and second order methods for learning: between steepest descent and Newton's method. Neural Computation,4:141–166, 1992.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Simulation Based Analysis of the Hierarchical Timed Coloured Petri Net Model of the Nigerian Voting System |
Country | : | Nigeria |
Authors | : | R. A. Ganiyu || E. O. Omidiora || A. O. Olaoluwa || T. A. Badmus |
Abstract: During Nigerian 2015 general elections, in an attempt to exercise their civic rights in voting for the candidates of their choices, many electorates exercised the limitations of their patience by tiredly waiting on queue for their turn at the poll centers. In order to study the aforementioned scenario, this paper carried out a simulation based analysis of a Hierarchical Timed Coloured Petri Net (HTCPN) model, which abstracted the Re-Modified Open-Secret Ballot System (REMOBS) adopted in the 2015 Nigerian general elections. Using CPN Tools, ten simulation runs were carried out on the HTCPN model..........
Keywords: Voters, Election, Petri Nets, modularized-model, voter arrival rate.
[1] Pujol-Ahulló, Jardí-Cedó R. and Castellà-Roca Verification Systems for Electronic Voting: A Survey. Lecture Notes in Informatics (LNI) – Proceedings, Series of the GesellschaftfürInformatik (GI), 2010;Volume P-167.
[2] Okwong, AtteEnyenihi, IT-Based Solutions to the Electoral System in Nigeria. West African Journal of Industrial and Academic Research 2012;Vol.5 No. 1
[3] Charles Stewart, I. I. I., Alvarez, R. M., and Hall, T. E. Voting Technology and the Election Experience: The 2009 Gubernatorial Races in New Jersey and Virginia. Electronic Voting 2010; (EVOTE2010), pp 19.
[4] Charles Stewart, I.I.I. and Stephen Ansolabehere, Executive Summary: Waiting in Line to Vote in 2013. JL & Pol., 2013; 28,439.
[5] Sastry, N. Kohno,Verifying Security Properties in Electronic Voting Machines, Ph.D. Thesis, EECS Department, University of California, Berkeley, URL. 2007
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Four Problem Minimization in Software Testing Resource Allocation |
Country | : | India. |
Authors | : | K. SaiSindhuja || A. Yuva krishna |
Abstract: Cumulative software testing resource for software faults needs a software development planning model that were based on expected problems and this plan has been formulated for four software development planning problems. Previously optimization is done on effort, cost and fault minimization. Now cumulative estimation on development phase is absorbed with realistic assumptions for this search based software engineering. This helps in optimizing the testing resource allocation in realistic. Cumulative with linear programming are for solving the problem. Software testing Resource allocation and release time decisions are vital for the software systems..........
Keywords: Development planning model, operational profile, software reliability model, software testing-resource allocation.
[1]. R. S. Pressman, Software Engineering: A Practitioner's Approach, McGraw-Hill, 6th Edition, 2005.
[2]. M. R. Lyu, Handbook of Software Reliability Engineering, McGraw Hill, 1996.
[3]. J. D. Musa, A. Iannino, and K. Okumoto, Software Reliability, Measurement, Prediction and Application, McGraw Hill, 1987.
[4]. M. Xie, Software Reliability Modeling, World Scientific Publishing Company, 1991.
[5]. AL.Goel, and K. Okumoto, "Time dependent error detection rate model for software reliability and other performance measures,‖ IEEE Transaction on Reliability. vol. 28 no. 3, pp. 206-211,1979.