- Home
- A-Z Publications
- Recent Patents on Engineering
- Previous Issues
- Volume 15, Issue 2, 2021
Recent Patents on Engineering - Volume 15, Issue 2, 2021
Volume 15, Issue 2, 2021
-
-
Cluster and Outlier Analysis for Ground Water Quality Data in the Regions of Kadapa District in Andhra Pradesh
More LessBackground: Patents suggest that groundwater contaminated with chemicals, bacteria, oils or gases etc. leads to many types of diseases in people. Fresh and clean water plays a significant role in human life. In this study, water samples were collected from different regions of the Kadapa district, Andhra Pradesh. Methods: Water samples were collected in plastic bottles with a tight cap washed with distilled water. Totally, 57 Read More
-
-
-
Heart Disease Prediction System using Ensemble of Machine Learning Algorithms
Authors: Nandhini A. Rajendran and Durai Raj VincentBackground: Diagnosing diseases is an intricate job in medical field. Machine learning when applied to health care is capable of early detection of disease which would aid to provide early medical intervention. In heart disease prediction, machine learning techniques have played a significant role. Analysis of disease has become vital in health care sectors. The massive data collected by healthcare sectors are preprocessed an Read More
-
-
-
Hyperspectral Image Data Classification with Refined Spectral Spatial Features Based on Stacked Autoencoder Approach
Authors: Jacintha Menezes and Nagesh PoojaryBackground: Hyperspectral (HS) image data comprises of tremendous amount of spatial and spectral information which offers feature identification and classification with high accuracy. As part of the Deep Learning (DL) framework Stacked Autoencoders (SAEs) has been successfully applied for deep spectral features extraction in high dimensional data. HS deep image feature extraction becomes complex and time consuming du Read More
-
-
-
Bayesian Game Approach to Mitigate DoS Attack in Vehicular Ad-Hoc Networks
Authors: Ilavendhan Anandaraj and Saruladha KrishnamurthyBackground: Trustful message transmission within the Vehicular ad-hoc Networks is needed as traffic related safety applications needs successful and reliable delivery of messages. The biggest issue is how only the trustworthy parties can be retained and the misbehaved are revoked. From the background analysis, it gives a detailed view of various vulnerabilities in these networks and the techniques used by the researchers to i Read More
-
-
-
Improving Energy Efficiency in Internet of Things using Artificial Bee Colony Algorithm
Authors: Murugan Sivaram, V. Porkodi, Amin S. Mohammed and S. Anbu KaruppusamyBackground: With the advent of IoT, the deployment of batteries with a limited lifetime in remote areas is a major concern. In certain conditions, the network lifetime gets restricted due to limited battery constraints. Subsequently, the collaborative approaches for key facilities to reduce the constraint demands of the current security protocols. Objective: This work covers and combines a wide range of concepts linked by IoT Read More
-
-
-
System Design of MEB in M-IWD Model with Heuristic Function on WSN
Authors: Mohamed Y. N. Mohamed, M.S. S. Basha and Pothula SujathaBackground: The Modified Intelligent Water Drop algorithm incorporated with the proposed heuristic function to enhance the characteristics of randomness, individual diversity to minimize the total energy required to broadcast the data from each sensor node towards the sink node in a network. Objective: The Modified Intelligent Water Drop Algorithm has been designed to achieve the divergence to find out an optimal M Read More
-
-
-
Agile Approach as a Universal Remedy for the Usual Failure in the Development of Software Projects
Authors: Sonam Srivastava and Ashwani KumarBackground: Agile is not a methodology neither can it be considered as a peculiar way of developing any software also it is neither a framework nor a process. Agile is a mindset or a collection of beliefs that can be used by the teams for taking the decisions while working on any software development. Agile mindset adopted for the development of software has gained attention of the researchers and industries across the Read More
-
-
-
Two-tier Grading System for NPDR Severities of Diabetic Retinopathy in Retinal Fundus Images
Authors: Charu Bhardwaj, Shruti Jain and Meenakshi SoodBackground: Diabetic Retinopathy is the leading cause of vision impairment and its early stage diagnosis relies on regular monitoring and timely treatment for anomalies exhibiting subtle distinction among different severity grades. The existing Diabetic Retinopathy (DR) detection approaches are subjective, laborious and time consuming which can only be carried out by skilled professionals. All the patents related to DR detecti Read More
-
-
-
A Survey on Prevention Techniques for Camcorder Video Piracy in Movie Theaters
Authors: Rohit Thanki and Surekha BorraMovies, advertisements, and promotional videos are Intellectual Property (IP) and are often shared on open access medium as part of the business. Fueled by the advancements in technology, piracy has become more rampant and a widely spread crime in many countries. Movie piracy is more dangerous to mega-budget producers who struggle to receive the maximum profit of their films, making them compete with smaller fil Read More
-
-
-
Causes of Deterioration in XLPE MV Cables: A Review
Authors: Ifetayo Oluwafemi, Ayodeji O. Salau and Timothy LaseindeBackground: Power failure and its related challenges is the cause of low economic development in most developing countries. Power failure is sometimes caused by the constant technical problems experienced by power network components which are being used for electric power transmission and distribution. Most distribution and transmission substations operate at medium voltages. Medium Voltage (MV) cables p Read More
-
-
-
Android Malware Detection Techniques: A Literature Review
Authors: Meghna Dhalaria and Ekta GandotraObjective: This paper provides the basics of Android malware, its evolution and tools and techniques for malware analysis. Its main aim is to present a review of the literature on Android malware detection using machine learning and deep learning and identify the research gaps. It provides the insights obtained through literature and future research directions which could help researchers to come up with robust an Read More
-
-
-
Analysis of Senegal Type Vertical Axis Wind Turbines Arrangement in Wind Farm
Authors: Li Zheng, Zhang Wenda, Han Ruihua and Qi WeiqiangBackground: In a wind farm, the wind speed of the downstream wind turbine will be lower than the wind speed of the upstream wind turbine due to the influence of the wake. Therefore, the wake of wind turbines is one of the uncertain factors predicting the annual power generation of the wind farms. The study on the wake can effectively improve the efficiency of power generation. The arrangement of vertical axis wind turbines Read More
-
-
-
A Novel Scheme for Prevention and Detection of Black Hole & Gray Hole Attack in VANET Network
Authors: Ankit Kumar, Pankaj Dadheech, Dinesh Goyal, Pawan K. Patidar, S.R. Dogiwal and Neha JanuBackground and Objective: VANET is an application used for the intelligent transportation system which improves traffic safety as well as its efficiency. We have reviewed the patents related to vehicular Ad-Hoc Network and their issue. To avoid road accidents a lot of information we need in advance. This paper has developed a framework which minimizes the possibilities of the black hole attack in VANET. According to us, t Read More
-
Volumes & issues
-
Volume 19 (2025)
-
Volume 18 (2024)
-
Volume 17 (2023)
-
Volume 16 (2022)
-
Volume 15 (2021)
-
Volume 14 (2020)
-
Volume 13 (2019)
-
Volume 12 (2018)
-
Volume 11 (2017)
-
Volume 10 (2016)
-
Volume 9 (2015)
-
Volume 8 (2014)
-
Volume 7 (2013)
-
Volume 6 (2012)
-
Volume 5 (2011)
-
Volume 4 (2010)
-
Volume 3 (2009)
-
Volume 2 (2008)
-
Volume 1 (2007)
Most Read This Month
Article
content/journals/eng
Journal
10
5
false
en
