- Home
- A-Z Publications
- Recent Advances in Computer Science and Communications
- Previous Issues
- Volume 14, Issue 2, 2021
Recent Advances in Computer Science and Communications - Volume 14, Issue 2, 2021
Volume 14, Issue 2, 2021
-
-
ECG Analysis: A Brief Review
Authors: Saumendra K. Mohapatra and Mihir N. MohantyIn recent years, cardiac problems have been found proportional to technology development. As the cardiac signal (Electrocardiogram) relates to the electrical activity of the heart of a living being, the technology develops accordingly day-by-day to support physicians and diagnosis. It has many applications along with medical applications. Accurate analysis of electrocardiogram (ECG) signal can information for detection, cl Read More
-
-
-
Low Cost and Centimeter-Level Global Positioning System Accuracy Using Real-Time Kinematic Library and Real-Time Kinematic GPSA
Authors: Hemant K. Gianey, Mumtaz Ali, Varadarajan Vijayakumar, Ashutosh Sharma and Rajiv KumarIntroduction: Accuracy and total design and implementation cost of the GPS framework determine the viability of GPS based projects. As the greater part of the advanced framework including telemetry, IoT, Cloud, and AUTOSAR frameworks use GPS to get exact outcomes, finding a software-controlled error correction becomes important. The execution of open source library such as RTKLIB will help in controlling and Read More
-
-
-
Pose and Illumination Invariant Hybrid Feature Extraction for Newborn
Authors: Rishav Singh, Ritika Singh, Aakriti Acharya, Shrikant Tiwari and Hari OmBackground: Abduction, swapping and mix-ups are the unfortunate events that could happen to Newborn while in hospital premises and medical personnel are finding it difficult to curb this unfortunate incident. Accurate patient identification (ID) is essential for patient safety, especially with our smallest and most vulnerable paediatric patients. The level of security is very crucial issue in maternity ward and the problem of mis Read More
-
-
-
Intuitionistic Fuzzy Shapley-TOPSIS Method for Multi-Criteria Decision Making Problems Based on Information Measures
Authors: Reetu Kumari, Arunodaya R. Mishra and Deelip K. SharmaAims & Background: Cloud Computing (CC) offers unique scalable and all time available services to the user. As service provision is an important part of the Cloud computing concept, the proper choice of the desired service is of most relevance according to the users’ needs. Various associations like as Microsoft and Facebook have revealed momentous investments in CC and currently offer services with top levels of r Read More
-
-
-
A Novel and Secure Hybrid iWD-MASK Algorithm for Enhanced Image Security
Authors: Righa Tandon and P.K. GuptaBackground: Most of the work has been done using DES, AES, and MAES for key generation in the image encryption. These algorithms provide better results for text based encryption when compared with digital image encryption. These algorithms are less secure and efficient. A new hybrid approach has been introduced for digital image encryption i.e. Chaos-based approach. This approach is designed for image related data Read More
-
-
-
A Fully Convolutional Neural Network for Recognition of Diabetic Retinopathy in Fundus Images
Authors: Manaswini Jena, Smita P. Mishra and Debahuti MishraBackground: Diabetic retinopathy is one of the complexities of diabetics and a major cause of vision loss worldwide which come into sight due to prolonged diabetes. For the automatic detection of diabetic retinopathy through fundus images several technical approaches have been proposed. The visual information processing by convolutional neural network makes itself more suitable due to its spatial arrangement of units. Co Read More
-
-
-
Threshold Detection Scheme Based on Parametric Distribution Fitting for Optical Fiber Channels
Authors: Mohammed Usman, Mohd Wajid, Muhammad Z. Shamim, Mohd D. Ansari and Vinit K. GunjanBackground: When data is transmitted by encoding it in the amplitude of the transmitted signal, such as in Amplitude Shift Keying, the receiver makes a decision on the transmitted data by observing the amplitude of the received signal. Objective: Depending on the level of the received signal, the receiver has to decode the received data, with minimum probability of error. For binary transmission, this is achieved by choo Read More
-
-
-
A Fast Method for Defogging of Outdoor Visual Images
More LessBackground: Capturing image in severe atmospheric catastrophe especially in fog critically degrades the quality of an image and thereby reduces its visibility of which in turn affects several computer vision applications like visual surveillance detection, intelligent vehicles, remote sensing, etc. Thus acquiring clear vision is the prime requirement of any image. In the last few years, many approaches have been directed towards Read More
-
-
-
Improving Scalability, Sparsity and Cold Start User Issues in Collaborative Tagging with Incremental Clustering and Trust
Authors: Latha Banda and Karan SinghBackground: Due to huge data in web sites, recommending users for every product is impossible. For this problem Recommender Systems (RS) are introduced. RS is categorized into Content-Based (CB), collaborative Filtering (CF) and Hybrid RS. Based on these techniques recommendations are done to user. In this, CF is the recent technique used in RS in which tagging feature also provided. Objective: Three main issues occur in Read More
-
-
-
A Method for Webpage Classification Based on URL Using Clustering
Authors: Sunita, Gurvinder Singh and Vijay RanaBackground: Pattern mining is the mechanism of extracting useful information from a large dataset of information. A sub-field of web mining is sequential Noisy data extraction from user query, which is considered along with redundancy handling. This redundancy handling mechanism employed in the existing literature is known as ambiguity handling. The clustering mechanism employed in the existing system includes Read More
-
-
-
Performance Analysis of TCP Variants Using AODV and DSDV Routing Protocols in MANETs
Authors: Rajnesh Singh, Neeta Singh and Aarti G. DinkerBackground: TCP is the most reliable transport layer protocol that provides reliable data delivery from source to destination node. The background of TCP suggests that it works well in wired networks but it is assumed that TCP is less preferred for ad-hoc networks. However, for application in ad-hoc networks, TCP can be modified to improve its performance. Various researchers have proposed improvised variants of TCP by only Read More
-
-
-
Logistic Step Size Based Artificial Bee Colony Algorithm for Optimum Induction Motor Speed Control
Authors: Fani B. Sharma and Shashi R. KapoorBackground: The disruption in the parameters of Induction Motor (IM) is quite frequent. In case of substantial parameter disruption, the IM becomes unreliable. Methods: To deal with this complication of parameter disruption, the Proportional-Integral (PI) controllers are utilized. The selection of PI controller parameters is process dependent and any inappropriate selection of controller setting may diverge to instabilit Read More
-
-
-
A Hybrid Protocol Using Fuzzy Logic and Rough Set Theory for Target Coverage
Authors: Pooja Chaturvedi and Ajai K. DanielBackground: Target coverage is considered a significant problem in the area of wireless sensor networks, which usually aims at monitoring a given set of targets with the required confidence level so that network lifetime can be enhanced while considering the constraints of the resources. Objective: To maximize the lifetime of the sensor network and minimize the overhead involved in the scheduling approach, such that the Read More
-
-
-
A Hybrid Technique for Selection and Minimization of Test Cases in Regression Testing
Authors: Leena Singh, Shailendra N. Singh and Sudhir DawraBackground: In today’s era, modifications in a software is a common requirement by customers. When changes are made to existing software, re-testing of all the test cases is required to ensure that the newly introduced changes do not have any unwanted effect on the behavior of the software. However, retesting of all the test cases would not only be time consuming but also expensive. Therefore, there is a need for a Read More
-
-
-
A Novel and Secure Image Encryption Scheme Based on Chaotic Logistic Map and Random Scrambling Using a Special Parameter of Gray Code Transformation
Authors: Sudeept S. Yadav and Yashpal SinghBackground: Image security is a major concern in the digital communication media. So there are so many algorithms symmetric and asymmetric are available for securely transmit the image. In symmetric key algorithm many algorithms are available based on bit plane decomposition and random scrambling using chaotic maps. Objective: A secure image encryption algorithm is proposed based on the combination of (n, k, Read More
-
-
-
An Un-Supervised Approach for Backorder Prediction Using Deep Autoencoder
Authors: Gunjan Saraogi, Deepa Gupta, Lavanya Sharma and Ajay RanaBackground: Backorders are an accepted abnormality affecting accumulation alternation and logistics, sales, chump service, and manufacturing, which generally leads to low sales and low chump satisfaction. A predictive archetypal can analyze which articles are best acceptable to acquaintance backorders giving the alignment advice and time to adjust, thereby demography accomplishes to aerate their profit. Obje Read More
-
-
-
A Hybrid Combination of LS-SVM and KPCA with Bat Algorithm for Intrusion Detection
Authors: Thiruppathy K. V. and Loheswaran K.Background: Intrusion Detection System refers to a kind of software which is designed for securing a network or an information system by alerting the administrators automatically when someone is trying to compromise the overall system through malicious activities. An intrusion is a process of causing a system to enter into an insecure state. Thus, an intruder is a person or an attacker who attempts to violate the security meas Read More
-
-
-
Multi-Level Image Segmentation of Color Images Using Opposition Based Improved Firefly Algorithm
Authors: Abhay Sharma, Rekha Chaturvedi, Umesh Dwivedi and Sandeep KumarBackground: Image segmentation is the fundamental step in image processing. Numerous image segmentation algorithms have been proposed already for grey scale images and they are very complex and time-consuming. Since most of the algorithms suffer from over and under segmentation problem, multi-level image thresholding is very effective method against this problem. Nature inspired meta-heuristics alg Read More
-
-
-
Analysis of High-Efficiency Transformerless Inverter for a Grid-Tied PV Power System with Reactive Power Control
Authors: Selvamathi Ramachandran and Indragandhi VairavasundaramBackground: In recent days grid-tied PV power systems play a vital role in the entire energy system. In a grid –tied PV system Transformerless Inverter (TI) topologies are preferred for its reduced price, improved efficiency, lightweight etc. Therefore many transformerless topologies have been proposed and verified with real power injection only. Recently, almost every international standard has imposed that a specified a Read More
-
-
-
An Empirical Comparison of t-GSC and ACO_TCSP Applied to Time Bound Test Selection
Authors: Nishtha Jatana and Bharti SuriBackground: Test case selection is a highly researched and inevitable software testing activity. Various kinds of optimization approaches are being used for solving the test selection and prioritization problem. Greedy approach and search based techniques have already been applied to address test case selection. A greedy approach to solve set cover problem is proposed to find a minimal test suite that is able to detect maximu Read More
-
-
-
Data Control in Public Cloud Computing: Issues and Challenges
Authors: Ashok Sharma, Pranay Jha and Sartaj SinghBackground: The Advancement in the Hardware and Progress in IoT based devices has led to significant transformation in digitalization and globalization of business models in the IT World. In fact Cloud Computing has attracted many companies to expand their business by providing IT infrastructure with very less budget in pay per use model. The Expansion and Migration of Companies to Cloud Computing facilities has r Read More
-
-
-
Ensemble Visual Content Based Search and Retrieval for Natural Scene Images
Authors: Pushpendra Singh, P.N. Hrisheekesha and Vinai K. SinghBackground: Content Based Image Retrieval (CBIR) is one of the fields for information retrieval where similar images are retrieved from database based on the various image descriptive parameters. The image descriptor vector is used by machine learning based systems to store, learn and template matching. These feature descriptor vectors locally or globally demonstrate the visual content present in an image using textur Read More
-
-
-
Test Case Prioritization Using Bat Algorithm
Authors: Anu Bajaj and Om P. SangwanBackground: Regression testing is very important stage of software maintenance and evolution phase. The software keeps on updating and to preserve the software quality, it needs to be retested every time it is updated. Due to limited resources, complete testing of the software becomes tedious task. The probable solution to this problem is to execute those test cases first that are more important prior to less important te Read More
-
-
-
Design of Relation Extraction Framework to Develop Knowledge Base
Authors: Poonam Jatwani, Pradeep Tomar and Vandana DhingraBackground: Web documents display information in the form of natural language text which is not understandable by machines. To search specific information from sea of web documents has become very challenging as it shows many unwanted non relevant documents along with relevant documents. To retrieve relevant information semantic knowledge can be stored in the domain specific ontology which helps in understa Read More
-
-
-
Software Reliability Prediction of Open Source Software Using Soft Computing Technique
Authors: Saini G.L., Deepak Panwar and Vijander SinghBackground: In software development, reliability performs a significant role. It is the nonfunctional requirement of the software. Before using the Open Source Software (OSS) for software development, it is essential to check the quality of the open source software. It is challenging to identify that which OSS is suitable for development of software. Conventional software reliability prediction models are suitable for the Commer Read More
-
-
-
An Optimal Feature Selection Method for Automatic Face Retrieval Using Enhanced Grasshopper Optimization Algorithm
Authors: Arun K. Shukla and Suvendu KanungoBackground: Retrieval of facial images based on its contents is one of the main areas of research. However, images contain high dimensional feature vectors and it is a challenging task to select the relevant features due to the variations available in the images of similar objects. Therefore, the selection of relevant features is an important step to make the facial retrieval system computationally efficient and more accurate. Read More
-
-
-
Feature Selection Method Based on Grey Wolf Optimization and Simulated Annealing
Authors: Avinash C. Pandey and Dharmveer S. RajpootBackground: Feature selection sometimes also known as attribute subset selection is a process in which optimal subset of features are elected with respect to target data by reducing dimensionality and removing irrelevant features. There will be 2n possible solutions for a dataset having n number of features that is difficult to solve by conventional attribute selection method. In such cases metaheuristic-based methods gen Read More
-
-
-
EBPA: A Novel Framework for the Analysis of Process Performance on the Basis of Real-Time NASA Application
Authors: Shashank Sharma and Sumit SrivastavaBackground: Workflow extraction is the connecting link between process modelling and data mining. Extraction of information and make insight from it using event log is the primary objective of workflow mining. The learning got along these logs can build comprehension about the workflow of procedures and association of different processes. That can help with upgrading them if necessary. Objective: The aim of this paper is Read More
-
-
-
The Development of a Modified Ear Recognition System for Personnel Identification
Authors: Haitham S. Hasan and Mais A. Al-SharqiBackground: This study proposed a Match Region Localization (MRL) Ear Recognition System (ERS). Captured ear images were pre-processed through cropping and enhancement. The preprocessed ear images were segmented using the proposed MRL segmentation algorithm and divided into 160 sub-images. The principal features of the segmented ear images were extracted and used in template generation. k-nearest ne Read More
-
Most Read This Month
Article
content/journals/rascs
Journal
10
5
false
en
