EMPLOYABILITY OF DIGITAL IMAGE PROCESSING APPLICATION IN FPGA AND ASIC IMPLEMENTATION OF SYSTOLIC ARRAYS FOR THE DESIGN OF OPTIMIZED MEDIAN FILTER |
Author : Anoushka Gupta |
Abstract | Full Text |
Abstract :Background/Objectives: A new systolic algorithm for median filtering is analyzed in this paper; this algorithm is suitable for VLSI implementation to design an optimized median filter. Methods/Statistical analysis: The modified sort algorithm avoiding the main problem of the median filter is its high computational
cost (for sorting N pixels, the temporal complexity is O (N·log N), even with the most efficient sorting algorithms, the clock cycle time is equal to the propagation delay of a simple comparator circuit |
|
APPLICABILITY OF SVM, RANDOM FOREST, AND DECISION TREE ALGORITHMS IN TEXT MINING FOR EFFECTIVE DETECTION OF ABUSIVE LANGUAGE IN ASSIGNED DATASETS |
Author : Romharsh Mittal |
Abstract | Full Text |
Abstract :Objectives: To provide related literature on the detection of Abusive language on Twitter using natural language processing (NLP). Methods: In this study, the survey has been conducted on different techniques and research done on the types of Abusive language used in social media, why it is essential? How it has been detected in real-time social media platforms and the performance metrics that are used by researchers in evaluating the performance of the detection of abusive language on Twitter by the users |
|
DEVELOPING AN INTEGRATED SYSTEM BASED ON INTERNET OF THINGS (IOT) AND WIRELESS SENSING NETWORK (WSN) IN THE EFFICACIOUS EARLY DETECTION AND PREVENTION OF FOREST AND WILD FIRES |
Author : Stuti Garg |
Abstract | Full Text |
Abstract :Jungles are the reason for supporting the biological system and clears the earth and gives cover nourishment to life reliant on it. People owe an incredible obligation in protecting the rest of the
forestlands and make preventive strides towards the demolition of woodland. One of the significant reasons for woodland annihilation is forest fires. So this undertaking manages the improvement of a savvy continuous and programmed early admonition framework for a woods fire. It empowers remote observing of conditions inside the woods locales and makes a ready when a backwoods fire is distinguished by one of a kind mail and Sms, |
|
EVALUATING THE EFFECTIVENESS OF KEY ALGORITHMS OF PATTERN MATCHING TO ENHANCE THE EFFICACY OF BOYER-MOORE-HORSPOOL ALGORITHM AND RABIN KARP ALGORITHM IN MALICIOUS PROGRAM DETECTION |
Author : Ruchika Goel |
Abstract | Full Text |
Abstract :Computer viruses are serious threats to society. There are numerous procedures that are used for resolving this downside. Our purpose here is to create a collective look on numerous pattern matching approaches that are employed in the domain of malicious program detection and mitigation. In virus detection, the program starts matching with some known or trained patterns which tell us that the attack has been done. Keywords: Pattern Matching Algorithms |
|
CONSTRUCTION AND TESTING OF COMPRESSED AIR VEHICLE |
Author : Shobhit Mishra, Shubham Tokas, Jatinder Pal Singh |
Abstract | Full Text |
Abstract :Development of new technologies in the field of locomotion in automobiles is crucial in the quest to find new ways to make a vehicle perform. The current state of automobiles requires combustion of fossil fuels such as petrol, diesel, etc. to make the pistons move. Earth faces a difficult time ahead. With the fast depleting natural resources like coal and fossil fuels, we shall face a shortage of fuels very soon. Thus, the trips and tours that we take now days so conveniently shall not be possible any more. The fuel prices shall rise so fast that common people could not afford them anymore. That is why there is dire need of an alternate source of fuel.
|
|
ANALYZING THE USABILITY OF ONTOLOGY LINKED NAIVE BAYESIAN TO CHECK PERVASIVE ONLINE SPAM REVIEW" |
Author : Vishal Duhan |
Abstract | Full Text |
Abstract :Now a days, lots of people in current era using social media for making their mindset to buy some products or services. Opinion mining spam investigation is a challenging errand to dissect the survey since counterfeit audits can be made by the proprietor of the item and also people for various purposes. They use to write
unwanted or fake reviews to approach readers or use automated detection technique to encourage or discourage target products and their reputations. In my paper, our new approach is based on knowledgebased Ontology and some other approach to detect opinion spam with high accuracy |
|
AN EXPLORATION OF THE KEY INFLUENCER TO SECURITY FEATURES IN CLOUD COMPUTING FRAMEWORK AND PLATFORMS |
Author : Saumya Shikhar Raj |
Abstract | Full Text |
Abstract :Objective: This paper focuses around the approaches to start specialist co-ops to make a more secure cloud platform by just verifying distributed computing servers, contributing a security scanner before sparing onto a cloud lastly before getting to a cloud provider, the utilization of a secret word or key to enter your cloud account. Strategies: This paper is broad research in the cloud security through secret phrase may be progressed, for example, biometric scanners, unique mark scanners previously utilized on most cell phones, and is seen as a sheltered method to store information on a gadget like a hard-drive. The significant
unpredictability of distributed computing is security protection |
|
EMPLOYABILITY OF HYBRID EXTREME LEARNING AND NEURAL NETWORKS IN THE EFFICACIOUS DIAGNOSIS AND MANAGEMENT OF DIABETES MELLITUS |
Author : Saumya Shikhar Raj |
Abstract | Full Text |
Abstract :Objectives: To design a classifier for the detection of Diabetes Mellitus with optimal cost and precise performance. Method and Analysis: The diagnosis and interpretation of the diabetes data are must because a major problem occurs due to this data maintenance. Several types of research are made with machine
learning but still needs improvements. In this paper, a new method is evaluated as a hybrid Extreme Learning Machine (HELM) with African Buffalo Optimization (ABO). Findings: ELM is used to select the input data because of the fast learning speed. |
|
LEVERAGING THE RECURRENT NEURAL NETWORK AND DENSE NET IN THE CLASSIFICATION OF BRAIN TUMORS |
Author : Chakshu Gupta |
Abstract | Full Text |
Abstract :We present a comprehensive Brain tumours screening and arrangement strategy for identifying and recognizing different kinds of cerebrum tumors on MR pictures. The difficulties emerge from the unique varieties of area, shape, size, and complexity of these tumors. The proposed calculations begin with highlight extraction from pivotal cuts utilizing thick convolutional neural systems; the acquired following highlights of many edges are then bolstered into a broken neural network for grouping. Unique concerning most other cerebrum tumor grouping calculations, our structure is free from the manual or programmed locale of interests division |
|
INFORMATION MINING: EMPLOYABILITY OF ID3 & C4.5 ALGORITHMS IN ENHANCING CLASSIFICATION CRITERIAS |
Author : Karan Sablok |
Abstract | Full Text |
Abstract :An instructive foundation needs an inexact earlier learning of selected understudies to foresee their execution in future scholastics. This encourages them to distinguish promising understudies and furthermore gives them a chance to focus on and enhance the individuals who might most likely get bring down evaluations. As an answer, we have built up a framework which can anticipate the execution of understudies from their past exhibitions utilizing ideas of information mining systems under Classification. We have dissected the informational index containing data about understudies, for example, sexual orientation, marks scored in the board examinations of classes X and XII, stamps and rank in placement tests and results in first year of the past group of understudies. By applying the ID3 (Iterative Dichotomiser 3) and C4.5 grouping calculations on this information, we have anticipated the general and individual execution of newly conceded understudies in future examinations.
|
|
INTELLIGENT INFORMATION RETRIEVAL SYSTEM: EMPLOYABILITY OF NATURAL LANGUAGE UNDERSTANDING & KNOWLEDGE ACQUISITION AS AN INFLUENCER TO ENHANCE CREDIBILITY OUTPUTS |
Author : Pushkar Garg |
Abstract | Full Text |
Abstract :The purpose of this article is to describe explores ways to solve the difficult problems in the study of the intelligent information retrieval system. This paper first discusses the basic concepts and the structure of the intelligent information retrieval system, the principles of artificial intelligence, the relationship between computer and artificial intelligence, the stage of artificial intelligence research experience, research areas and applications of artificial intelligence, the components and the use of the artificial intelligent information retrieval system in detail. And using the results of artificial intelligence research
suggests the method to solve the difficulties which are in the areas of natural language understanding, knowledge representation and knowledge acquisition.
|
|
DEVELOPING AN INTEGRATED MODEL USING SIGNAL AND SPEECH PROCESSING, CONTENT AND ACOUSTIC ANALYSIS TO ENHANCE THE EFFICACY OF SER USING PREDICTIVE STATISTICAL METRICS |
Author : Karan Gupta |
Abstract | Full Text |
Abstract :Different authorities have coordinated examinations on the affirmation of feeling from human talk with different examination designs. Speech Emotion Recognition (SER) is a specific class of signal processing where the principal objective is to recognize the energetic state of people from voice. Effects of acoustic parameters, the authenticity of the data used, and execution of the classifiers have been the pivotal issues for feeling affirmation investigate the field. 81 s (distributed in the listed diaries) have been assessed by the approaches used for feeling stamping, acoustic features and classifiers and the database used. The principle point is to examine: portray the highlights of the databases being used and to make a brief on
the proficiency of acoustic parameters and the classifiers utilized by the past examinations.
|
|
ENHANCING THE PERFORMANCE OF APACHE HADOOP IN MINING SORTING AND NORMALISING LARGE DATA SETS |
Author : Sahil Kapoor |
Abstract | Full Text |
Abstract :Big knowledge refers to varied types of massive info sets that need special machine platforms so as to be analyzed. analysis on huge knowledge emerged within the Nineteen Seventies however has seen Associate in Nursing explosion of publications since 2008. The Apache Hadoop software system library primarily based framework offers permissions to distribute vast quantity of datasets process across clusters of computers mistreatment simple coder models. In this paper, we have a tendency to discuss the design of Hadoop, survey paper varied knowledge duplication placement methods Associate in Nursing propose Associate in Nursing approach for the advance of information replica placement and recommend an implementation of planned algorithmic rule with various Map scale back applications for rising performance of information in Hadoop clusters with relation to execution time and variety of nodes in Hadoop platform. |
|
QUANTUM CRYPTOGRAPHY – EXPLORING THE APPLICABILITY OF BB84 AND EPR ALGORITHMS IN ENHANCING THE QKD |
Author : Divyashi Agrawal |
Abstract | Full Text |
Abstract :Today secure communications are increasingly more important to the intended communicators without being intercepted by eavesdroppers. Quantum cryptography promises to revolutionize the key distribution problem in cryptographic system by providing a secure communication channel between two parties with high security guaranteed by the fundamental laws of the physics. Quantum cryptography provides the solution that uses property of polarization to ensure that transmitted data is not disturbed. Basic protocols for QKD provide maximum 25% (B92 protocol) and 50% (BB84 and EPR) idealized efficiency receptively, which is not enough
for secure transmission of shared key. This work provides the mechanism that enhances the data security in quantum cryptography during exchange of information by increasing the size of shared key up to 75%. The identity verification mechanism tries to provide maximum success for explanation of Quantum key distribution’s EPR protocol is given |
|
ATTEMPTING A FRAMEWORK FOR THE INFERENTIAL ANALYTICS TO CREATE AN ONLINE SHOPPING DATA WAREHOUSE FOR REAL TIME PREDICTIONS |
Author : Nishita Lamba |
Abstract | Full Text |
Abstract :Web based shopping or web based retailing is a type of electronic trade enabling customers to specifically purchase products or administrations from a merchant over the Internet without a
delegate benefit.
|
|
AN EXPLORATION, EVALUATION OF SOFTWARES AND DATABASE MODELS IN THE EFFICACIOUS APPLICATION OF MODERN BIOINFORMATICS TECHNIQUES IN THE EARLY DETECTION OF CANCER |
Author : Saksham Rai |
Abstract | Full Text |
Abstract :Epigenetic modifications, and in particular the acetylation and deacetylation of histones are major contributors to carcinogenesis and form an increasingly important area in cancer research. The ultimate goal of cancer research lies in the analysis and organization of the increasing amount of data and also the discovery of novel therapeutic or diagnostic options. This article reviewsthe various efficient bioinformatics methods for cancer research. The main concepts and principles for the important and commonly used bioinformatics methods are introduced. In addition, a list of available software and databases are provided. Finally, future directions and challenges for the development and applications of various techniques are
discussed. We suggest that the evaluation of such technologies could form the important steps in the future development of successful cancer therapeutic options.
|
|
EXPLORING THE EMPLOYABILITY OF DENSE NET AND RECURRENT NEURAL NETWORK IN THE EFFICACIOUS DEVELOPMENT OF BRAIN TUMOUR CLASSIFICATION |
Author : Adarsh Dhiman |
Abstract | Full Text |
Abstract :We present a comprehensive Braintumours screening and arrangement strategy for identifying and recognising different kinds of cerebrum tumours on MR pictures. The difficulties emerge from the unique varieties of area, shape, size, and complexity of these tumours. The proposed calculations begin with highlight extraction from pivotal cuts utilising thick convolutional neural systems; the acquired following highlights of many edges are then bolstered into a broken neural network for grouping. Unique concerning most other cerebrum tumour
grouping calculations, our structure is free from the manual or programmed locale of interest’s division. The outcomes gave an account of an open dataset, and a populace of 422 exclusive MRI checks analysed as should be expected, gliomas, meningiomas, and metastatic cerebrum tumours exhibit the adequacy and effectiveness of our technique.
|
|
ATTEMPTING AN ANALYSIS OF THE KEY INFLUENCES OF BUSINESS INTELLIGENCE AND ITS EFFICACY IN CLOUD COMPUTING ENVIRONMENTS |
Author : Shubham Aggarwal |
Abstract | Full Text |
Abstract :Cloud computing is one of the most demanding technology in recent times. Though it is costly and having lots of challenges in managing cloud servers, still it is demanding and used in business analytics Business intelligence is a fantastic source that enhances itself from cloud terminology and technical aspects. Response time and business intelligence solutions work parallel. This paper targets a clear understanding and deep insights on mathematical indicators of BI, and it encounters with cloud lexicons. The Concepts of BI is Easily Applied using Cloudsim and cloud analytics, which enhance the result with different models.
|
|
DEVELOPING A MODEL BASED ON PRIVACY PRESERVING DATA MINING (PPDM) SYSTEMS TO ENHANCE THE SECURITY SAFEGUARD ON MEDICAL DATABASES |
Author : Vipul Goyal |
Abstract | Full Text |
Abstract :For both the generation and utilization of information, the web is turning into a standard though the security for private information is progressively diminishing. In this way, to have a protected exchange in the information, security and protection would be the key issues to be considered. As of late, security has become a key issue in numerous information mining and information disclosure fields which lead to the advancement
of numerous Privacy-Preserving Data Mining (PPDM) systems. In our work, we utilize not many of these methods to secretly save the information holder, for example, emergency clinic information. In this, we use methods named "Anonymization", "Concealment", "Speculation" and "Information Hiding" on various fields for the information to be progressively secure and venture the information which is helpful to general society |
|