- Home
- A-Z Publications
- Recent Advances in Computer Science and Communications
- Previous Issues
- Volume 14, Issue 2, 2021
Recent Advances in Computer Science and Communications - Volume 14, Issue 2, 2021
Volume 14, Issue 2, 2021
-
-
ECG Analysis: A Brief Review
Authors: Saumendra K. Mohapatra and Mihir N. MohantyIn recent years, cardiac problems have been found proportional to technology development. As the cardiac signal (Electrocardiogram) relates to the electrical activity of the heart of a living being, the technology develops accordingly day-by-day to support physicians and diagnosis. It has many applications along with medical applications. Accurate analysis of electrocardiogram (ECG) signal can information for detection, cl Read More
-
-
-
Low Cost and Centimeter-Level Global Positioning System Accuracy Using Real-Time Kinematic Library and Real-Time Kinematic GPSA
Authors: Hemant K. Gianey, Mumtaz Ali, Varadarajan Vijayakumar, Ashutosh Sharma and Rajiv KumarIntroduction: Accuracy and total design and implementation cost of the GPS framework determine the viability of GPS based projects. As the greater part of the advanced framework including telemetry, IoT, Cloud, and AUTOSAR frameworks use GPS to get exact outcomes, finding a software-controlled error correction becomes important. The execution of open source library such as RTKLIB will help in controlling and Read More
-
-
-
Pose and Illumination Invariant Hybrid Feature Extraction for Newborn
Authors: Rishav Singh, Ritika Singh, Aakriti Acharya, Shrikant Tiwari and Hari OmBackground: Abduction, swapping and mix-ups are the unfortunate events that could happen to Newborn while in hospital premises and medical personnel are finding it difficult to curb this unfortunate incident. Accurate patient identification (ID) is essential for patient safety, especially with our smallest and most vulnerable paediatric patients. The level of security is very crucial issue in maternity ward and the problem of mis Read More
-
-
-
Intuitionistic Fuzzy Shapley-TOPSIS Method for Multi-Criteria Decision Making Problems Based on Information Measures
Authors: Reetu Kumari, Arunodaya R. Mishra and Deelip K. SharmaAims & Background: Cloud Computing (CC) offers unique scalable and all time available services to the user. As service provision is an important part of the Cloud computing concept, the proper choice of the desired service is of most relevance according to the users’ needs. Various associations like as Microsoft and Facebook have revealed momentous investments in CC and currently offer services with top levels of r Read More
-
-
-
A Novel and Secure Hybrid iWD-MASK Algorithm for Enhanced Image Security
Authors: Righa Tandon and P.K. GuptaBackground: Most of the work has been done using DES, AES, and MAES for key generation in the image encryption. These algorithms provide better results for text based encryption when compared with digital image encryption. These algorithms are less secure and efficient. A new hybrid approach has been introduced for digital image encryption i.e. Chaos-based approach. This approach is designed for image related data Read More
-
-
-
A Fully Convolutional Neural Network for Recognition of Diabetic Retinopathy in Fundus Images
Authors: Manaswini Jena, Smita P. Mishra and Debahuti MishraBackground: Diabetic retinopathy is one of the complexities of diabetics and a major cause of vision loss worldwide which come into sight due to prolonged diabetes. For the automatic detection of diabetic retinopathy through fundus images several technical approaches have been proposed. The visual information processing by convolutional neural network makes itself more suitable due to its spatial arrangement of units. Co Read More
-
-
-
Threshold Detection Scheme Based on Parametric Distribution Fitting for Optical Fiber Channels
Authors: Mohammed Usman, Mohd Wajid, Muhammad Z. Shamim, Mohd D. Ansari and Vinit K. GunjanBackground: When data is transmitted by encoding it in the amplitude of the transmitted signal, such as in Amplitude Shift Keying, the receiver makes a decision on the transmitted data by observing the amplitude of the received signal. Objective: Depending on the level of the received signal, the receiver has to decode the received data, with minimum probability of error. For binary transmission, this is achieved by choo Read More
-
-
-
A Fast Method for Defogging of Outdoor Visual Images
More LessBackground: Capturing image in severe atmospheric catastrophe especially in fog critically degrades the quality of an image and thereby reduces its visibility of which in turn affects several computer vision applications like visual surveillance detection, intelligent vehicles, remote sensing, etc. Thus acquiring clear vision is the prime requirement of any image. In the last few years, many approaches have been directed towards Read More
-
-
-
Improving Scalability, Sparsity and Cold Start User Issues in Collaborative Tagging with Incremental Clustering and Trust
Authors: Latha Banda and Karan SinghBackground: Due to huge data in web sites, recommending users for every product is impossible. For this problem Recommender Systems (RS) are introduced. RS is categorized into Content-Based (CB), collaborative Filtering (CF) and Hybrid RS. Based on these techniques recommendations are done to user. In this, CF is the recent technique used in RS in which tagging feature also provided. Objective: Three main issues occur in Read More
-
-
-
A Method for Webpage Classification Based on URL Using Clustering
Authors: Sunita, Gurvinder Singh and Vijay RanaBackground: Pattern mining is the mechanism of extracting useful information from a large dataset of information. A sub-field of web mining is sequential Noisy data extraction from user query, which is considered along with redundancy handling. This redundancy handling mechanism employed in the existing literature is known as ambiguity handling. The clustering mechanism employed in the existing system includes Read More
-
-
-
Performance Analysis of TCP Variants Using AODV and DSDV Routing Protocols in MANETs
Authors: Rajnesh Singh, Neeta Singh and Aarti G. DinkerBackground: TCP is the most reliable transport layer protocol that provides reliable data delivery from source to destination node. The background of TCP suggests that it works well in wired networks but it is assumed that TCP is less preferred for ad-hoc networks. However, for application in ad-hoc networks, TCP can be modified to improve its performance. Various researchers have proposed improvised variants of TCP by only Read More
-
-
-
Logistic Step Size Based Artificial Bee Colony Algorithm for Optimum Induction Motor Speed Control
Authors: Fani B. Sharma and Shashi R. KapoorBackground: The disruption in the parameters of Induction Motor (IM) is quite frequent. In case of substantial parameter disruption, the IM becomes unreliable. Methods: To deal with this complication of parameter disruption, the Proportional-Integral (PI) controllers are utilized. The selection of PI controller parameters is process dependent and any inappropriate selection of controller setting may diverge to instabilit Read More
-
-
-
A Hybrid Protocol Using Fuzzy Logic and Rough Set Theory for Target Coverage
Authors: Pooja Chaturvedi and Ajai K. DanielBackground: Target coverage is considered a significant problem in the area of wireless sensor networks, which usually aims at monitoring a given set of targets with the required confidence level so that network lifetime can be enhanced while considering the constraints of the resources. Objective: To maximize the lifetime of the sensor network and minimize the overhead involved in the scheduling approach, such that the Read More
-
-
-
A Hybrid Technique for Selection and Minimization of Test Cases in Regression Testing
Authors: Leena Singh, Shailendra N. Singh and Sudhir DawraBackground: In today’s era, modifications in a software is a common requirement by customers. When changes are made to existing software, re-testing of all the test cases is required to ensure that the newly introduced changes do not have any unwanted effect on the behavior of the software. However, retesting of all the test cases would not only be time consuming but also expensive. Therefore, there is a need for a Read More
-
-
-
A Novel and Secure Image Encryption Scheme Based on Chaotic Logistic Map and Random Scrambling Using a Special Parameter of Gray Code Transformation
Authors: Sudeept S. Yadav and Yashpal SinghBackground: Image security is a major concern in the digital communication media. So there are so many algorithms symmetric and asymmetric are available for securely transmit the image. In symmetric key algorithm many algorithms are available based on bit plane decomposition and random scrambling using chaotic maps. Objective: A secure image encryption algorithm is proposed based on the combination of (n, k, Read More
-
-
-
An Un-Supervised Approach for Backorder Prediction Using Deep Autoencoder
Authors: Gunjan Saraogi, Deepa Gupta, Lavanya Sharma and Ajay RanaBackground: Backorders are an accepted abnormality affecting accumulation alternation and logistics, sales, chump service, and manufacturing, which generally leads to low sales and low chump satisfaction. A predictive archetypal can analyze which articles are best acceptable to acquaintance backorders giving the alignment advice and time to adjust, thereby demography accomplishes to aerate their profit. Obje Read More
-
-
-
A Hybrid Combination of LS-SVM and KPCA with Bat Algorithm for Intrusion Detection
Authors: Thiruppathy K. V. and Loheswaran K.Background: Intrusion Detection System refers to a kind of software which is designed for securing a network or an information system by alerting the administrators automatically when someone is trying to compromise the overall system through malicious activities. An intrusion is a process of causing a system to enter into an insecure state. Thus, an intruder is a person or an attacker who attempts to violate the security meas Read More
-
Most Read This Month
Article
content/journals/rascs
Journal
10
5
false
en
